PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-5741 Schneider Electric CVE debrief

CVE-2025-5741 affects Schneider Electric EVLink WallBox all versions. It is a CWE-22 path traversal issue that could allow arbitrary file reads from the charging station, but exploitation requires an authenticated web server session. Because the product is end of life, Schneider Electric states that no fix is planned; the recommended response is to restrict access, segment the network, review logs, and migrate to the replacement EVLink Pro AC.

Vendor
Schneider Electric
Product
EVLink WallBox
CVSS
MEDIUM 4.9
CISA KEV
Not listed in stored evidence
Original CVE published
2025-06-10
Original CVE updated
2025-07-08
Advisory published
2025-06-10
Advisory updated
2025-07-08

Who should care

Operators of Schneider Electric EVLink WallBox charging stations, OT/ICS security teams, facility managers, and anyone responsible for networks that expose the device’s web interface.

Technical summary

The advisory describes a path traversal weakness in the EVLink WallBox web server that can be used to read arbitrary files from the charging station. The published CVSS vector is CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N, which reflects network reachability, high privileges required, and a confidentiality-only impact profile. CISA’s CSAF record and Schneider Electric’s notice both say the exploitation requires an authenticated session.

Defensive priority

Medium. Prioritize this more urgently if the charging station’s web interface is reachable outside a tightly controlled management network or if credential hygiene is weak.

Recommended defensive actions

  • Block unauthorized access to the device’s HTTP interface with firewall rules and network segmentation.
  • Limit management access to trusted administrative networks only.
  • Review device access logs periodically for suspicious requests or file-access attempts.
  • Use strong, unique passwords and do not share credentials; change them periodically.
  • Plan migration to Schneider Electric EVLink Pro AC, since EVLink WallBox is end of life and no fix is planned for affected versions.

Evidence notes

CISA’s CSAF advisory ICSA-25-175-04 (published 2025-06-10, modified 2025-07-08) lists CVE-2025-5741 for Schneider Electric EVLink WallBox all versions and describes a CWE-22 path traversal that can cause arbitrary file reads, requiring an authenticated web server session. The Schneider Electric security notice SEVD-2025-161-03 contains the same vulnerability description and mitigation guidance. The supplied source corpus also marks the product as end of life and indicates no fix is planned.

Official resources

Publicly disclosed on 2025-06-10 in CISA CSAF advisory ICSA-25-175-04 and Schneider Electric notice SEVD-2025-161-03; the advisory was modified on 2025-07-08. The supplied corpus does not indicate CISA KEV listing.