Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| WOLFBOX | Level 2 EV Charger | 3.1.17 (main), 1.2.6 (MCU) | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-5749 | WOLFBOX Level 2 EV Charger BLE Encryption Keys Uninitialized Variable Authentication Bypas | |
| CVE-2025-5750 | WOLFBOX Level 2 EV Charger tuya_svc_devos_activate_result_parse Heap-based Buffer Overflow | |
| CVE-2025-5748 | WOLFBOX Level 2 EV Charger LAN OTA Exposed Dangerous Method Remote Code Execution Vulnerab | |
| CVE-2025-5747 | WOLFBOX Level 2 EV Charger MCU Command Parsing Misinterpretation of Input Remote Code Exec |
No comments yet