### [CVE-2021-34588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34588) ![](https://img.shields.io/static/v1?label=Product&message=CC612&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=CC613&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=ICC15xx&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=ICC16xx&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.11.x%3C%205.11.2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-425%20Direct%20Request%20(Forced%20Browsing)&color=brighgreen) ### Description In Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is empty after reboot . ### POC #### Reference - https://cert.vde.com/en/advisories/VDE-2021-047 #### Github No PoCs found on GitHub currently.