2025-04-15 21:50:38
icscert
PUBLISHED
Unauthenticated attackers can query information about total energy consumed by EV chargers of arbitrary users.