CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-43660: Arbitrary file download using .sh

7.1 CVSS

Description

The CGI script .sh can be used to download any file on the filesystem.

This issue affects Iocharger firmware for AC model chargers beforeversion 24120701.

Likelihood: High, but credentials required.

Impact: Critical – The script can be used to download any file on the filesystem, including sensitive files such as /etc/shadow, the CGI script source code or binaries and configuration files.

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/S:P/AU:Y
CVSS clarification. The attack can be executed over any network connection the station is listening to and serves the web interface (AV:N), and there are no additional security measure sin place that need to be circumvented (AC:L), the attack does not rely on preconditions (AT:N). The attack does require authentication, but the level of authentication is irrelevant (PR:L), it does not require user interaction (UI:N). The confidentiality of all files of the devicd can be compromised (VC:H/VI:N/VA:N). There is no impact on subsequent systems. (SC:N/SI:N/SA:N). While this device is an EV charger handing significant amounts of power, this attack in isolation does not have a safety impact. The attack can be automated (AU:Y).

Classification

CVE ID: CVE-2024-43660

CVSS Base Severity: HIGH

CVSS Base Score: 7.1

Affected Products

Vendor: Iocharger

Product: Iocharger firmware for AC models

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 17.82% (scored less or equal to compared to others)

EPSS Date: 2025-02-07 (when was this score calculated)

References

https://csirt.divd.nl/DIVD-2024-00035/
https://csirt.divd.nl/CVE-2024-43660/
https://iocharger.com

Timeline