Quick Look: CVE-2026-25293 — Critical Buffer Overflow in Qualcomm QCA7005 PLC Firmware via Incorrect Authorization

A brief summary of CVE-2026-25293, a critical (CVSS 9.6) buffer overflow in Qualcomm QCA7005 Powerline Communication firmware caused by incorrect authorization, affecting Snapdragon Auto platform components used in automotive and EV charging environments.

CVE Analysis

5 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-05-04

Quick Look: CVE-2026-25293 — Critical Buffer Overflow in Qualcomm QCA7005 PLC Firmware via Incorrect Authorization
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

A critical authorization bypass in Qualcomm's QCA7005 Powerline Communication firmware allows an unauthenticated attacker on an adjacent network to trigger a buffer overflow, potentially compromising not just the PLC chip but connected automotive and industrial systems beyond it. With a CVSS score of 9.6 and a scope change designation, this vulnerability is particularly relevant for organizations deploying Snapdragon Auto platform components in EV charging infrastructure and connected vehicle environments.

The QCA7005 is a Qualcomm chipset providing 10 MBps Powerline Communication capabilities, primarily used within the Snapdragon Auto platform for automotive connectivity and EV charging applications. Powerline Communication technology transmits data over existing electrical wiring, making it a key enabler for vehicle to grid communication in electric vehicle charging stations. The chipset's deployment in safety critical automotive contexts makes vulnerabilities in its firmware especially consequential.

Technical Information

The root cause of CVE-2026-25293 is an incorrect authorization check within the QCA7005 PLC firmware that, when bypassed, leads to a buffer overflow condition. The vulnerability is classified under CWE-863 (Incorrect Authorization), meaning the firmware fails to properly verify that a requesting entity has the necessary permissions before processing input that ultimately overflows a buffer.

The CVSS 3.1 vector string is AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H. The individual metrics break down as follows:

MetricValueImplication
Attack VectorAdjacentAttacker must have access to the adjacent network (e.g., shared powerline segment)
Attack ComplexityLowNo specialized conditions or extenuating circumstances required
Privileges RequiredNoneNo prior authentication needed
User InteractionNoneExploit triggers without any action from a legitimate user
ScopeChangedCompromise can impact resources beyond the vulnerable component
ConfidentialityHighComplete loss of confidentiality possible
IntegrityHighComplete loss of integrity possible
AvailabilityHighComplete loss of availability possible

The Scope: Changed designation is the most consequential aspect of this rating. It means a successful exploit against the PLC firmware can affect resources beyond the vulnerable component itself. In the context of the Snapdragon Auto platform, this could mean lateral movement from the compromised PLC chip into connected vehicle systems, telematics units, or EV charging infrastructure controllers.

Attack Flow

Based on the available technical details, exploitation would proceed along these lines:

  1. The attacker gains access to the adjacent powerline network. In EV charging scenarios, this could mean connecting to the same electrical circuit as the target device, potentially through a public or shared charging station.
  2. The attacker sends crafted traffic to the QCA7005 chip over the powerline network.
  3. Due to the incorrect authorization defect, the firmware processes the malicious input without verifying that the sender has appropriate permissions.
  4. The improperly authorized input triggers a buffer overflow in the PLC firmware.
  5. With the buffer overflow achieved, the attacker gains control over the PLC firmware execution context.
  6. Because of the scope change, the attacker can then potentially pivot from the compromised PLC firmware to affect other systems connected through the Snapdragon Auto platform.

The combination of no authentication requirement, no user interaction, and low attack complexity makes this vulnerability particularly accessible to attackers who can achieve adjacent network positioning.

Affected Systems and Versions

The vulnerability affects the Qualcomm QCA7005 Powerline Communication chipset, which is part of the Snapdragon Auto platform. The QCA7005 operates at 10 MBps and is used in automotive connectivity and EV charging applications.

Qualcomm's May 2026 Security Bulletin identifies the affected component as PLC firmware (PLC FW). Specific firmware version numbers were not enumerated in the available documentation. Organizations should consult the bulletin directly and contact their device manufacturer for precise version information relevant to their deployments.

Vendor Security History

Qualcomm maintains a structured product security program with monthly security bulletins designed to help customers incorporate security updates into launched or upcoming devices. The May 2026 Security Bulletin follows their established coordinated disclosure model, categorizing vulnerabilities by technology area and severity while acknowledging external researchers. This systematic approach to vulnerability disclosure reflects the company's ongoing engagement with the security research community, including organizations like the Trend Micro Zero Day Initiative.

References

Detect & fix
what others miss

Security magnifying glass visualization