Back to overview

Bender/ebee: Multiple Charge Controller Vulnerabilities

VDE-2021-047
Last update
04/26/2022 12:00
Published at
04/26/2022 12:00
Vendor(s)
Bender GmbH & Co. KG
External ID
VDE-2021-047
CSAF Document

Summary

Bender is publishing this advisory to inform customers about multiple security vulnerabilities in the Charge Controller product families.Bender has analysed the weaknesses and determined that the electrical safety of the devices is not concerned. To Benders knowledge, proof-of-concept code or exploits for the weaknesses are not available to the public.Bender considers some weaknesses to be critical and thus need to be patched immediately. Therefore, patches are provided as maintenance branch versions 5.11.2, 5.12.5, 5.13.2 and 5.20.2. Future software releases will of course already include these patches.

Impact

The vulnerability allows a malicious entity to bypass credential check and escalate privileges.

Affected Product(s)

Model no. Product name Affected versions
CC612 Firmware <5.20.2
CC613 Firmware <5.20.2
ICC15xx Firmware <5.20.2
ICC16xx Firmware <5.20.2

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Use of Hard-coded Credentials (CWE-798)
Summary

In Bender/ebee Charge Controllers in multiple versions are prone to Hardcoded Credentials. Bender charge controller CC612 in version 5.20.1 and below is prone to hardcoded ssh credentials. An attacker may use the password to gain administrative access to the web-UI.

References

Published
09/22/2025 14:58
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

In Bender/ebee Charge Controllers in multiple versions are prone to Command injection via Web interface. An authenticated attacker could enter shell commands into some input fields that are executed with root privileges.

References

Published
09/22/2025 14:58
Weakness
Direct Request ('Forced Browsing') (CWE-425)
Summary

In Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is empty after reboot .

References

Published
09/22/2025 14:58
Weakness
Execution with Unnecessary Privileges (CWE-250)
Summary

In Bender/ebee Charge Controllers in multiple versions are prone to Local privilege Escalation. An authenticated attacker could get root access via the suid applications socat, ip udhcpc and ifplugd.

References

Published
09/22/2025 14:58
Weakness
Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary

In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface.

References

Published
09/22/2025 14:58
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

In Bender/ebee Charge Controllers in multiple versions are prone to Cross-site Scripting. An authenticated attacker could write HTML Code into configuration values. These values are not properly escaped when displayed.

References

Published
09/22/2025 14:58
Weakness
Stack-based Buffer Overflow (CWE-121)
Summary

In Bender/ebee Charge Controllers in multiple versions a long URL could lead to webserver crash. The URL is used as input of an sprintf to a stack variable.

References

Mitigation

Restrict network access to the above-mentioned devices.

Remediation

Install latest software update.

Revision History

Version Date Summary
1 04/26/2022 12:00 Initial revision.