EVMAPA
EVMAPA charging stations contain multiple authentication and authorization flaws (CWE-306, CWE-307, CWE-613) that allow unauthenticated or weakly authenticated remote command execution. Vulnerabilities affect charging station status reporting and control via OCPP (Open Charge Point Protocol). CVE-2025-54816 allows attackers to change authorization keys on stations that support key modification. CVE-2025-53968 has no vendor statement. CVE-2025-55705 involves duplicate CBID (Charge Box ID) connections that could allow spoofing. All versions of EVMAPA are currently affected with no vendor patch released.
- Network access to EVMAPA charging station over standard protocols (OCPP/WebSocket or direct network connection)
- No valid credentials required for exploitation of CWE-306 and CWE-307 vulnerabilities
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5a0825ae-107e-4b6c-9458-984004020317Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.