Attackers exploit vulnerabilities in EVSE or their communication protocols to gain unauthorized access to the vehicle's systems.