### [CVE-2021-34589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34589) ![](https://img.shields.io/static/v1?label=Product&message=CC612&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=CC613&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=ICC15xx&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=ICC16xx&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.11.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.12.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.13.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.20.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Exposure&color=brightgreen) ### Description In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface. ### POC #### Reference - https://cert.vde.com/en/advisories/VDE-2021-047 #### Github No PoCs found on GitHub currently.