CVE-2020-8006

The server in Circontrol Raption through 5.11.2 has a pre-authentication stack-based buffer overflow that can be exploited to gain run-time control of the device as root. The ocpp1.5 and pwrstudio binaries on the charging station do not use a number of common exploitation mitigations. In particular, there are no stack canaries and they do not use the Position Independent Executable (PIE) format.
Configurations

No configuration.

History

21 Nov 2024, 05:38

Type Values Removed Values Added
References () https://circontrol.com/intelligent-charging-solutions/dc-chargers-series/raption-150/ - () https://circontrol.com/intelligent-charging-solutions/dc-chargers-series/raption-150/ -
References () https://seclists.org/fulldisclosure/2024/Mar/33 - () https://seclists.org/fulldisclosure/2024/Mar/33 -

01 Aug 2024, 13:42

Type Values Removed Values Added
CWE CWE-121
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

12 Apr 2024, 12:43

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-12 12:15

Updated : 2024-11-21 05:38


NVD link : CVE-2020-8006

Mitre link : CVE-2020-8006

CVE.ORG link : CVE-2020-8006


JSON object : View

Products Affected

No product.

CWE
CWE-121

Stack-based Buffer Overflow