Wiser Home Automation

Low RiskSEVD-2025-133-02May 13, 2025
Schneider ElectricEnergy
Summary

Schneider Electric Wiser home automation products (Wiser AvatarOn 6K Freelocate and Wiser Cuadro H 5P Socket) contain a buffer overflow vulnerability in the Silicon Labs Gecko Bootloader. Exploitation could result in persistent code execution on the affected device. No firmware patch is planned; mitigation relies on network isolation and access controls.

What this means
What could happen
A buffer overflow vulnerability in the bootloader of these home automation devices could allow an attacker to persistently execute arbitrary code on the device, potentially disrupting energy management or home automation functions in buildings with integrated Wiser systems.
Who's at risk
Facilities and building automation integrators using Schneider Electric Wiser home automation products (Wiser Cuadro H 5P Socket or Wiser AvatarOn 6K Freelocate) in energy management or smart grid deployments should isolate these devices and strengthen network controls. This primarily affects building operators and facility managers in the energy sector who use Wiser for smart socket or control relay functions.
How it could be exploited
An attacker with network access to the device (over Wi-Fi or LAN) could exploit the Gecko Bootloader vulnerability to trigger a buffer overflow, gaining the ability to inject and run malicious code that persists across reboots. This requires the device to be reachable on the network—either directly if exposed to the internet, or via compromise of another device on the same network segment.
Prerequisites
  • Network access to the Wiser device (Wi-Fi or LAN)
  • Device must be reachable from the attacker's network or the internet (if port forwarding is enabled)
remotely exploitableno patch availablepersistent code execution possibleaffects automation/control functions
Affected products (2)
2 EOL
ProductAffected VersionsFix Status
Wiser Cuadro H 5P Socket All versionsAll versionsNo fix (EOL)
Wiser AvatarOn 6K Freelocate All versionsAll versionsNo fix (EOL)
Remediation & Mitigation
0/6
Do now
0/5
HARDENINGChange the default admin password immediately to a strong password (minimum 20 characters with uppercase, lowercase, numbers, and special characters)
HARDENINGDisable port forwarding to the device; ensure it is not accessible from the public internet
HARDENINGPlace the device on a dedicated network segment (guest network or VLAN separate from main systems)
HARDENINGConfigure Wi-Fi to use WPA3 encryption if available, or WPA2 with protected management frames
HARDENINGRestrict physical access to USB and LAN ports on the device
Mitigations - no patch available
0/1
The following products have reached End of Life with no planned fix: Wiser Cuadro H 5P Socket All versions, Wiser AvatarOn 6K Freelocate All versions. Apply the following compensating controls:
HARDENINGSchedule regular reboots of the device, router, and connected systems
API: /api/v1/advisories/aa7ca857-9648-4737-9e96-4bf9974bde2a

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.