EVlink City / Parking / Smart Wallbox Charging Stations
Schneider Electric EVlink City, Parking, and Smart Wallbox charging stations contain multiple vulnerabilities affecting access control and authentication. Exploitation requires either physical access to the charging station's internal communication port (via disassembly) or network access to a connected supervision system, particularly if exposed to the internet. Successful exploitation allows an attacker to gain unauthorized access to the web server and modify charging station settings, accounts, and configurations, leading to potential denial of service, unauthorized charging usage, charging data loss, and unauthorized disclosure of station settings.
- Physical access to the charging station enclosure to reach the internal communication port, OR
- Network access to a charging station connected to a supervision system (especially if exposed to the internet)
- No valid credentials required to access the web server
Patching may require device reboot — plan for process interruption
/api/v1/advisories/500f8fc0-403c-4fe1-a94e-840615c934ebGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.