alpitronic Hypercharger EV charger
Successful exploitation of this vulnerability could result in an attacker disabling the Hypercharger device, bypassing payment, or accessing payment data. The vulnerability exists because the device uses default credentials and a management interface that was not intended for internet exposure. Attackers can exploit this by accessing the unprotected interface remotely if the device is connected to the public internet or untrusted networks. alpitronic has not released a firmware patch and states no fix is available for existing devices; instead, the vendor is applying runtime mitigations including automatic password reset and disabling exposed interfaces. The primary mitigation is to change default credentials immediately and ensure devices are not accessible from the public internet.
- Default credentials not changed (username and password set to factory defaults)
- Management interface exposed to the public internet or untrusted network
- Network connectivity to the Hypercharger's management port
Patching may require device reboot — plan for process interruption
/api/v1/advisories/dcf01aa6-a9e3-4578-88f6-48dbbd17f80c