VYPR
Unrated severityNVD Advisory· Published May 24, 2026

Besen BS20 EV Charging Station BLE/UDP insufficiently protected credentials

CVE-2026-9395

Description

A vulnerability was identified in Besen BS20 EV Charging Station up to 20260426. Affected is an unknown function of the component BLE/UDP. The manipulation leads to insufficiently protected credentials. The attack needs to be initiated within the local network. The original disclosure mentions, that "[t]hese vulnerabilities have been reported to Besen and we have received their acknowlegement that they are reviewing this as of April 2026."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Besen BS20 EV charger leaks credentials in cleartext over BLE and UDP, enabling local network attackers to capture and reuse passwords.

Vulnerability

Cleartext credential exposure exists in the Besen BS20 EV Charging Station up to firmware version 20260426. An unknown function in the BLE and UDP components transmits user credentials in plaintext. During operations such as a password change, both the old and new passwords are sent unencrypted. The same credentials are also broadcast periodically via UDP. This affects the BS20 charger and potentially other OEM-branded units (e.g., IEVISION, LECTRON). [1]

Exploitation

An attacker must be on the same local network as the charging station to capture the plaintext credentials from UDP broadcasts. For BLE exposure, the attacker needs BLE proximity (typically within 10–30 meters). No authentication or prior access is required. The attacker simply monitors network traffic or BLE advertisements to recover the credentials. [1]

Impact

Successful credential capture leads to unauthorized access and full control of the charging station. The attacker can then change settings, initiate charging sessions, or potentially pivot to other devices on the home network. The compromise affects the confidentiality of user credentials and the integrity of device control. [1]

Mitigation

As of April 2026, the vendor Besen has acknowledged the report and is reviewing the issue. No patched firmware version or specific workaround has been released. Users should monitor the vendor's support channels for updates and, if possible, isolate the charger on a separate VLAN to limit exposure on the local network. [1]

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.