{"vulnerability": "CVE-2024-43649", "sightings": [{"uuid": "8a37831b-45f3-48d7-a435-420c0ea5a7d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43649", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113799007314543960", "content": "", "creation_timestamp": "2025-01-09T15:04:08.723803Z"}, {"uuid": "43b3b8aa-99a8-4387-8b2e-db743e0c41b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43649", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797350829373745", "content": "", "creation_timestamp": "2025-01-09T08:02:53.287141Z"}, {"uuid": "d45b2817-2902-4e01-8186-0510f7cc828f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43649", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfcafuatxe2d", "content": "", "creation_timestamp": "2025-01-09T08:16:18.068750Z"}, {"uuid": "c663b30e-049d-4bfb-8f2d-085afd341ea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43649", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfcz4m6csz2y", "content": "", "creation_timestamp": "2025-01-09T15:38:32.885827Z"}, {"uuid": "045cc596-8b60-4732-a356-b7526b2b4c53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43649", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113799182201869927", "content": "", "creation_timestamp": "2025-01-09T15:48:37.927280Z"}, {"uuid": "8e61d1bc-4d0a-4933-b6e5-da21863277aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43649", "type": "seen", "source": "https://t.me/cvedetector/14814", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43649 - Iocharger AC Model Authenticated Root RCE through Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-43649 \nPublished : Jan. 9, 2025, 8:15 a.m. | 40\u00a0minutes ago \nDescription : Authenticated command injection in the filename of a .exe request leads to remote code execution as the root user.  \n  \nThis issue affects Iocharger firmware for AC models before version 24120701.  \n  \nLikelihood: Moderate \u2013 This action is not a common place for command injection vulnerabilities to occur. Thus, an attacker will likely only be able to find this vulnerability by reverse-engineering the firmware or trying it on all  fields. The attacker will also need a (low privilege) account to gain access to the  binary, or convince a user with such access to execute a payload.  \n  \nImpact: Critical \u2013 The attacker has full control over the charging station as the root user, and can arbitrarily add, modify and delete files and services.  \n  \nCVSS clarification:\u00a0This attack can be performed over any network conenction serving the web interfacr (AV:N), and there are not additional mitigating measures that need to be circumvented (AC:L) or other prerequisites (AT:N). The attack does require privileges, but the level does not matter (PR:L), there is no user interaction required (UI:N). The attack leeds to a full compromised of the charger (VC:H/VI:H/VA:H) and a compromised charger can be used to \"pivot\" to networks that should normally not be reachable (SC:L/SI:L/SA:H). Because this is an EV chargers with significant pwoer, there is a potential safety imp0act (S:P). THis attack can be automated (AU:Y). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T10:14:01.000000Z"}]}