Tesla Wall Connector Charger Hacked Through Charging Port in 18-Minute Attack

Tesla’s popular Wall Connector home charging system was exploited during the January 2025 Pwn2Own Automotive competition, demonstrating how attackers could gain control of the device through the charging cable itself.

The groundbreaking attack targeted the Tesla Wall Connector Gen 3, a residential AC electric vehicle charger capable of delivering up to 22 kW of power and commonly installed in homes, hotels, and businesses worldwide.

The vulnerability allowed researchers to achieve arbitrary code execution on the device, potentially providing attackers with access to private networks where these chargers are installed.

Tesla Wall Connector Charger Hacked

What makes this attack particularly concerning is its use of the charging connector as the primary entry point. The researchers discovered that Tesla vehicles can update Wall Connectors through the charging cable using a proprietary protocol, a feature that had never been publicly documented or analyzed before.

“We found that Tesla cars appear to be capable of updating the Tesla Wall Connector through the charging cable,” the Synacktiv team explained in their technical report. “This feature is not publicly documented from a user perspective, and neither the hardware nor the underlying protocol has been publicly analyzed.”

The attack exploited communication over the Control Pilot (CP) line using Single-Wire CAN (SWCAN), a non-standard protocol for this type of application. By building a custom Tesla car simulator, the researchers could communicate with the charger and exploit a critical logic flaw.

The exploit required significant technical sophistication. Researchers built custom hardware, including a modified USB-CAN adapter, and used a Raspberry Pi to control relays that simulated Tesla vehicle behavior. The attack involved downgrading the Wall Connector’s firmware to an older version (0.8.58) that contained debug features not present in current releases.

Once the firmware was downgraded, attackers could extract Wi-Fi credentials for the charger’s setup network and access a TCP debug shell. The researchers then exploited a buffer overflow vulnerability in the debug shell’s command parsing logic to achieve arbitrary code execution.

“The exploit worked on the first attempt during Pwn2Own, completing in approximately 18 minutes, mainly due to the low bandwidth of the SWCAN bus,” the team reported.

The vulnerability poses significant security risks since Wall Connectors are typically connected to private networks. Successful exploitation could provide attackers with a foothold into home, hotel, or business networks, potentially enabling lateral movement to other connected devices.

The attack demonstrated during the competition involved making the device’s LED blink as a proof-of-concept, but the implications extend far beyond simple visual confirmation.

With arbitrary code execution capabilities, attackers could potentially manipulate charging processes, access network traffic, or use the compromised device as a launching point for broader network attacks.

Tesla has responded to the vulnerability disclosure by implementing anti-downgrade mechanisms in newer firmware versions, which prevent the firmware rollback technique that was central to the researchers’ attack strategy.

The Pwn2Own Automotive competition continues to serve as a crucial testing ground for identifying vulnerabilities in connected vehicle systems and related infrastructure, helping manufacturers improve security before malicious actors can exploit these flaws in real-world scenarios.

Live Credential Theft Attack Unmask & Instant Defense – Free Webinar

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hikvision Exploiter – An Automated Exploitation Toolkit Targeting Hikvision IP Cameras

A new open-source tool called HikvisionExploiter has emerged, designed to automate attacks on vulnerable Hikvision…

5 minutes ago

10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester

The npm ecosystem faces a sophisticated new threat as ten malicious packages have emerged, each…

1 hour ago

PoC Exploit Released for BIND 9 Vulnerability that Let Attackers Forge DNS Records

A public exploit code demonstrating how attackers could exploit CVE-2025-40778, a critical vulnerability in BIND…

2 hours ago

Thousands of Exchange Servers in Germany Still Running with Out-of-Support Versions

Microsoft Exchange servers in Germany are still running without security updates, just weeks after the…

2 hours ago

Gunra Ransomware Leveraging Attacking Windows and Linux Systems with Two Encryption Methods

The threat landscape continues to evolve as Gunra ransomware emerged in April 2025, establishing itself…

2 hours ago

Google Unveils Guide for Defenders to Monitor Privileged User Accounts

In response to escalating threats of credential theft, Google, through its Mandiant cybersecurity division, has…

3 hours ago