TR | EN | DE | Our Site

Vestel AC Charger Sensitive Information Disclosure Vulnerability

 Vestel AC Charger Sensitive Information Disclosure Vulnerability

Overview

CVE-2025-3606 is a high-severity vulnerability (CVSS 8.7) affecting Vestel AC Charger version 3.75.0. The flaw allows an attacker to access sensitive files containing credentials, which could lead to further device compromise. This vulnerability was publicly disclosed on April 24, 2025, and poses a significant risk to devices using this firmware version.


Technical Details

The vulnerability arises due to insecure file permissions or directory traversal issues in the Vestel AC Charger’s web interface or API. An attacker can exploit this flaw to read configuration files, logs, or credential stores without authentication, potentially gaining access to:

  • Admin passwords

  • API keys

  • Session tokens

  • Network configurations

This could allow an attacker to:

  • Take full control of the charging station

  • Manipulate charging schedules

  • Steal user data

  • Use the device as a pivot point in a larger attack


Attack Scenarios

Scenario 1: Unauthenticated File Access via Web Interface

  1. An attacker discovers a Vestel AC Charger (v3.75.0) exposed to the internet.

  2. They send a crafted HTTP request to access restricted files:

    http
    Copy
    Download
    GET /../../etc/passwd HTTP/1.1  
    Host: <charger_IP>  
  3. The server responds with the contents of /etc/passwd, confirming directory traversal.

  4. The attacker then retrieves /var/config/credentials.db, extracting admin credentials.

  5. Using these credentials, the attacker logs in and modifies charging settings or deploys malware.

Scenario 2: Exploiting Misconfigured API Endpoints

  1. The Vestel charger has an undocumented API endpoint:

    http
    Copy
    Download
    GET /api/v1/config?file=credentials.json  
  2. An attacker sends this request and receives the credentials file in response.

  3. With the extracted credentials, they authenticate via SSH or the web dashboard.

  4. They then disable security controls or install a backdoor for persistent access.


Mitigation & Recommendations

  1. Apply Vendor Patches – Vestel is expected to release a firmware update. Users should upgrade immediately.

  2. Restrict Network Access – Ensure chargers are not exposed to the public internet. Use firewalls and VLAN segmentation.

  3. File Permission Hardening – Restrict read/write access to sensitive files.

  4. Monitor Logs for Suspicious Activity – Look for repeated failed access attempts or unusual file reads.

  5. Credential Rotation – Change all passwords and API keys after patching.


Conclusion

CVE-2025-3606 is a critical information disclosure flaw that could lead to full device takeover. Organizations using Vestel AC Chargers should prioritize patching and implement network security controls to prevent exploitation.



Crow

physics, information technologies, author, educator

Post a Comment

Hello, share your thoughts with us.

Previous Post Next Post

İletişim Formu