<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ev2go — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ev2go/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Feb 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ev2go/feed.xml" rel="self" type="application/rss+xml"/><item><title>EV2GO Charging Station Vulnerabilities Allow Impersonation and Denial of Service</title><link>https://feed.craftedsignal.io/briefs/2026-02-ev2go-vulns/</link><pubDate>Fri, 27 Feb 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-ev2go-vulns/</guid><description>Multiple vulnerabilities in EV2GO charging stations, including missing authentication and session management flaws, could allow attackers to impersonate stations, hijack sessions, and cause denial-of-service conditions.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been discovered in EV2GO ev2go.io charging stations. These vulnerabilities, identified as CVE-2026-24731, CVE-2026-25945, CVE-2026-20895, and CVE-2026-22890, relate to missing authentication for critical functions, improper restriction of excessive authentication attempts, insufficient session expiration, and insufficiently protected credentials. Successful exploitation of these flaws could enable attackers to impersonate charging stations, hijack legitimate user sessions, suppress or misroute traffic, potentially leading to a large-scale denial-of-service (DoS) attack. These vulnerabilities affect all versions of ev2go.io and impact critical infrastructure sectors such as energy and transportation systems globally. The lack of vendor response to reported vulnerabilities further exacerbates the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a valid charging station identifier using publicly accessible mapping platforms, exploiting CVE-2026-22890.</li>
<li>Attacker connects to the OCPP WebSocket endpoint of a charging station without proper authentication, leveraging CVE-2026-24731.</li>
<li>Attacker issues unauthorized OCPP commands to the backend as a legitimate charger, due to the missing authentication mechanisms (CVE-2026-24731).</li>
<li>Attacker attempts multiple authentication requests without any rate limiting, potentially leading to a denial-of-service (DoS) by overwhelming the backend (CVE-2026-25945).</li>
<li>Attacker hijacks or shadows existing sessions due to predictable session identifiers and the ability for multiple endpoints to connect using the same identifier (CVE-2026-20895).</li>
<li>Legitimate charging station is displaced, and the attacker receives backend commands intended for the original station (CVE-2026-20895).</li>
<li>Attacker manipulates charging station operations or charging network data reported to the backend.</li>
<li>Final objective: Cause disruption of charging services for users, corrupt charging network data, or potentially gain control of the charging infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have significant consequences. An attacker can disrupt charging services, leading to stranded electric vehicles and customer dissatisfaction. Data manipulation could result in incorrect billing or inaccurate reporting. A large-scale denial-of-service attack could impact entire charging networks, affecting energy distribution and transportation systems. Given the widespread deployment of EV2GO charging stations worldwide, a successful attack could affect a large number of users and critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to <code>ev2go.io</code> that do not originate from known, authorized charging stations.</li>
<li>Implement rate limiting on authentication attempts to the OCPP WebSocket API to mitigate CVE-2026-25945.</li>
<li>Deploy the Sigma rule &ldquo;Detect Unauthorized OCPP Connection&rdquo; to identify potential station impersonation attempts based on CVE-2026-24731.</li>
<li>Monitor for unexpected OCPP commands being issued from charging stations that are not aligned with normal operation to detect malicious manipulation of charging infrastructure, as described in CVE-2026-24731.</li>
<li>Contact EV2GO at <a href="https://ev2go.io/">https://ev2go.io/</a> for information on patching or mitigating these vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ev2go</category><category>charging-station</category><category>vulnerability</category><category>denial-of-service</category></item></channel></rss>