{"vulnerability": "CVE-2024-43661", "sightings": [{"uuid": "0d991852-cd9d-4918-911b-82eb1a054688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43661", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113799182581920046", "content": "", "creation_timestamp": "2025-01-09T15:48:43.069546Z"}, {"uuid": "3a012b45-5201-4bfe-af2b-e5b216d0522f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43661", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797527995004670", "content": "", "creation_timestamp": "2025-01-09T08:47:56.761395Z"}, {"uuid": "b74a3d7a-925c-4edf-b53b-d5993fa90d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43661", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfcagxwjoi25", "content": "", "creation_timestamp": "2025-01-09T08:16:55.383172Z"}, {"uuid": "3fd3ffdc-bc26-4903-b3d8-0fb335bf2ab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43661", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113799007314543960", "content": "", "creation_timestamp": "2025-01-09T15:04:09.124220Z"}, {"uuid": "b14508d4-fbda-4c08-bd72-8424c01f6b94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43661", "type": "seen", "source": "https://t.me/cvedetector/14806", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43661 - \"Iocharger AC Firmware Buffer Overflow - CGI Binary/Script Remote Denial of Service\"\", \n  \"Content\": \"CVE ID : CVE-2024-43661 \nPublished : Jan. 9, 2025, 8:15 a.m. | 40\u00a0minutes ago \nDescription : The .so library, which is used by , is  \nvulnerable to a buffer overflow in the code that handles the deletion  \nof certificates. This buffer overflow can be triggered by providing a  \nlong file path to the  action of the .exe CGI binary or  \nto the .sh CGI script. This binary or script will write this  \nfile path to , which is then  \nread by .so  \n  \n  \nThis issue affects Iocharger firmware for AC models before version 24120701.  \n  \nLikelihood: Moderate \u2013 An attacker will have to find this exploit by  \neither obtaining the binaries involved in this vulnerability, or by trial  \nand error. Furthermore, the attacker will need a (low privilege)  \naccount to gain access to the .exe CGI binary or .sh  \nscript to trigger the vulnerability, or convince a user with such access  \nsend an HTTP request that triggers it.  \n  \n  \nImpact: High \u2013 The  process, which we assume is  \nresponsible for OCPP communication, will keep crashing after  \nperforming the exploit. This happens because the buffer overflow  \ncauses the process to segfault before  \n is removed. This means that,  \neven though  is automatically restarted, it will crash  \nagain as soon as it tries to parse the text file.  \n  \nCVSS clarification. The attack can be executed over any network connection the station is listening to and serves the web interface (AV:N), and there are no additional security measure sin place that need to be circumvented (AC:L), the attack does not rely on preconditions (AT:N). The attack does require authentication, but the level of authentication is irrelevant (PR:L), it does not require user interaction (UI:N). The attack leads to reducred availability of the device (VC:N/VI:N/VA:H). THere is not impact on subsequent systems. (SC:N/SI:N/SA:N). Alltough this device is an EV charger handing significant amounts of power, we do not forsee a safety impact. The attack can be automated (AU:Y). Because the DoS condition is written to disk persistantly, it cannot be recovered by the user (R:I). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T10:13:50.000000Z"}]}