VYPR
Critical severity9.4NVD Advisory· Published Mar 20, 2026· Updated May 6, 2026

CVE-2026-25192

CVE-2026-25192

Description

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.

Affected products

2
  • Ctek/Chargeportal2 versions
    cpe:2.3:a:ctek:charge_portal:-:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:ctek:charge_portal:-:*:*:*:*:*:*:*
    • (no CPE)range: All versions

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.