Browse all 4 CVE security advisories affecting SWITCH EV. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SWITCH EV is an electric vehicle charging station provider focused on enabling sustainable transportation infrastructure. Historically, vulnerabilities in their systems have included remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from inadequate input validation and misconfigured access controls. While no major public security incidents have been widely reported, the presence of four CVEs indicates ongoing security challenges. Their charging stations typically connect to cloud-based management platforms, creating multiple attack surfaces that require continuous security hardening. The company's IoT devices face risks similar to other connected infrastructure, with potential impacts ranging from service disruption to unauthorized system access.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-27773 | SWITCH EV swtchenergy.com Insufficiently Protected Credentials — swtchenergy.comCWE-522 | 6.5 | Medium | 2026-02-27 |
| CVE-2026-25778 | SWITCH EV swtchenergy.com Insufficient Session Expiration — swtchenergy.comCWE-613 | 7.3 | High | 2026-02-27 |
| CVE-2026-25113 | SWITCH EV swtchenergy.com Improper Restriction of Excessive Authentication Attempts — swtchenergy.comCWE-307 | 7.5 | High | 2026-02-26 |
| CVE-2026-27767 | SWITCH EV swtchenergy.com Missing Authentication for Critical Function — swtchenergy.comCWE-306 | 9.4 | Critical | 2026-02-26 |
This page lists every published CVE security advisory associated with SWITCH EV. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.