VYPR
Unrated severityNVD Advisory· Published May 24, 2026

Besen BS20 EV Charging Station OTA Update Installation improper authorization

CVE-2026-9397

Description

A weakness has been identified in Besen BS20 EV Charging Station up to 20260426. Affected by this issue is some unknown functionality of the component OTA Update Installation Handler. This manipulation causes improper authorization. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The original disclosure mentions, that "[t]hese vulnerabilities have been reported to Besen and we have received their acknowlegement that they are reviewing this as of April 2026."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Besen BS20 EV charging stations lack proper authorization in the OTA update handler, allowing remote installation of unsigned firmware.

Vulnerability

CVE-2026-9397 describes an improper authorization weakness in the Over-The-Air (OTA) update installation handler of Besen BS20 Home EV Charging Stations up to firmware version 20260426. The device fails to properly validate the authenticity or authorization of OTA firmware update requests, allowing a remote attacker to trigger installation of unsigned or malicious firmware. The affected functionality is triggered during the firmware update process, and the condition is reachable over the network without any prior authentication required for the update endpoint.

Exploitation

Exploitation requires a remote network position able to intercept or spoof OTA update traffic to the charging station. The attack has a high complexity — the exploit must craft a properly sequenced update payload that bypasses the incomplete validation logic. No user interaction or local privileges are needed beyond network access. The attacker can spoof a legitimate OTA update server or inject a malicious update packet into the device's communication channel.

Impact

Successful exploitation allows an attacker to install arbitrary firmware onto the BS20 charging station, gaining full control over the device. This can lead to disruption of charging operations, extraction of configuration data, or use of the device as a pivot point into the local network. The impact is high in terms of integrity and availability, with potential for secondary compromise of connected systems.

Mitigation

As of the publication date (2026-05-24), Besen has acknowledged the report and stated they are reviewing the issue as of April 2026 [1]. No official patch or firmware update has been released. Users are advised to monitor the vendor's security advisories and restrict network access to the charging station until a fix is available. No workaround has been published. The vulnerability is not listed on CISA KEV as of this writing.

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.