VYPR
Unrated severityNVD Advisory· Published May 24, 2026

Besen BS20 EV Charging Station Firmware Version Check ui layer

CVE-2026-9396

Description

A security flaw has been discovered in Besen BS20 EV Charging Station up to 20260426. Affected by this vulnerability is an unknown functionality of the component Firmware Version Check. The manipulation results in improper restriction of rendered ui layers. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitation appears to be difficult. The original disclosure mentions, that "[t]hese vulnerabilities have been reported to Besen and we have received their acknowlegement that they are reviewing this as of April 2026."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A high-complexity UI-spoofing flaw in Besen BS20 EV chargers lets a network attacker trick users into applying phantom updates, undermining trust in the firmware version check.

Vulnerability

The Besen BS20 Home EV Charging Station (firmware versions up to 20260426) contains a UI-spoofing vulnerability in the Firmware Version Check functionality of the mobile app. When the app checks for a new firmware version, it does not validate the response from the server. An attacker can intercept and modify the response to report an arbitrary, higher version number, causing the app to display a “New firmware available” prompt and enable the upgrade button even when the device is already up to date [1].

Exploitation

The attack requires the attacker to be on the same local network as the charging station (or to have compromised a network intermediary) to intercept the version-check communication. High complexity is associated with this attack because of the need to reliably position and execute man-in-the-middle (MITM) interception. The attacker must spoof a version response that is greater than the current installed version; the app does not perform any cryptographic validation of the response before presenting the upgrade prompt to the user [1].

Impact

Successful exploitation leads to UI spoofing: the user is shown a misleading “newer firmware” notification and a clickable upgrade button, even though no genuine update exists. While the vulnerability alone does not directly install malicious firmware, it undermines user trust and can be used as a precursor to social engineering attacks. It could also be combined with other OTA-related weaknesses (e.g., incomplete firmware validation, reported as CVE-2026-9397) to induce a user to install a tampered firmware image [1].

Mitigation

As of the publication date (May 24, 2026), Besen has acknowledged the report and stated they are reviewing the vulnerability, but no fixed firmware version or patch has been released. Users should monitor the vendor’s support page for updates. As a workaround, network segmentation and monitoring of BLE/UDP traffic may help detect spoofed responses, but the most effective mitigation is a firmware update that enforces cryptographic validation of version-check responses. The vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog [1].

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.