CVE-2025-10371: Unrestricted Upload in eCharge Hardy Barth Salia PLCC
A security flaw has been discovered in eCharge Hardy Barth Salia PLCC 2.2.0. This issue affects some unknown processing of the file /api.php. The manipulation of the argument setrfidlist results in unrestricted upload. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10371 is a security vulnerability identified in version 2.2.0 of the eCharge Hardy Barth Salia PLCC product. The flaw resides in the handling of the /api.php endpoint, specifically in the processing of the 'setrfidlist' argument. This vulnerability allows an attacker to perform an unrestricted file upload remotely without any authentication or user interaction. The unrestricted upload means that an attacker can upload arbitrary files, potentially including malicious scripts or executables, to the server hosting the vulnerable application. This can lead to remote code execution, data compromise, or further system compromise depending on the nature of the uploaded files and the server configuration. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, with an attack vector of network (remote), low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vendor has been contacted but has not responded or provided a patch, and although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of exploitation. The lack of authentication and the ability to upload files unrestrictedly make this vulnerability particularly dangerous for exposed systems. The affected product, Salia PLCC, is likely used in environments related to e-mobility or charging infrastructure, given the vendor's profile, which could have operational implications if compromised.
Potential Impact
For European organizations, especially those involved in electric vehicle charging infrastructure or related sectors where eCharge Hardy Barth Salia PLCC is deployed, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access, remote code execution, and potential disruption of charging services. This could impact business continuity, cause reputational damage, and potentially expose sensitive operational data. Given the critical role of charging infrastructure in supporting the EU's green energy and transportation initiatives, disruption or compromise could have broader economic and environmental consequences. Additionally, compromised systems could be used as pivot points for further attacks within organizational networks. The medium severity rating does not diminish the practical risk, especially since no authentication is required and the exploit is publicly available. Organizations relying on this product without mitigations are at risk of targeted attacks or opportunistic exploitation.
Mitigation Recommendations
Since no official patch or vendor response is available, European organizations should implement compensating controls immediately. These include restricting network access to the /api.php endpoint by implementing strict firewall rules or network segmentation to limit exposure to trusted IP addresses only. Web application firewalls (WAFs) should be configured to detect and block suspicious file upload attempts, particularly those targeting the 'setrfidlist' parameter. Monitoring and logging of all upload activities on the affected endpoint should be enhanced to detect anomalous behavior promptly. Organizations should conduct thorough audits of existing uploaded files to identify any unauthorized or malicious content. If feasible, disabling or restricting the vulnerable functionality temporarily until a patch is available is recommended. Additionally, organizations should prepare incident response plans specific to this vulnerability and educate relevant personnel about the risks and detection methods. Finally, maintaining up-to-date backups and ensuring rapid recovery capabilities will mitigate potential damage from exploitation.
Affected Countries
Germany, France, Netherlands, Belgium, Sweden, Norway, Denmark
CVE-2025-10371: Unrestricted Upload in eCharge Hardy Barth Salia PLCC
Description
A security flaw has been discovered in eCharge Hardy Barth Salia PLCC 2.2.0. This issue affects some unknown processing of the file /api.php. The manipulation of the argument setrfidlist results in unrestricted upload. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10371 is a security vulnerability identified in version 2.2.0 of the eCharge Hardy Barth Salia PLCC product. The flaw resides in the handling of the /api.php endpoint, specifically in the processing of the 'setrfidlist' argument. This vulnerability allows an attacker to perform an unrestricted file upload remotely without any authentication or user interaction. The unrestricted upload means that an attacker can upload arbitrary files, potentially including malicious scripts or executables, to the server hosting the vulnerable application. This can lead to remote code execution, data compromise, or further system compromise depending on the nature of the uploaded files and the server configuration. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, with an attack vector of network (remote), low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vendor has been contacted but has not responded or provided a patch, and although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of exploitation. The lack of authentication and the ability to upload files unrestrictedly make this vulnerability particularly dangerous for exposed systems. The affected product, Salia PLCC, is likely used in environments related to e-mobility or charging infrastructure, given the vendor's profile, which could have operational implications if compromised.
Potential Impact
For European organizations, especially those involved in electric vehicle charging infrastructure or related sectors where eCharge Hardy Barth Salia PLCC is deployed, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access, remote code execution, and potential disruption of charging services. This could impact business continuity, cause reputational damage, and potentially expose sensitive operational data. Given the critical role of charging infrastructure in supporting the EU's green energy and transportation initiatives, disruption or compromise could have broader economic and environmental consequences. Additionally, compromised systems could be used as pivot points for further attacks within organizational networks. The medium severity rating does not diminish the practical risk, especially since no authentication is required and the exploit is publicly available. Organizations relying on this product without mitigations are at risk of targeted attacks or opportunistic exploitation.
Mitigation Recommendations
Since no official patch or vendor response is available, European organizations should implement compensating controls immediately. These include restricting network access to the /api.php endpoint by implementing strict firewall rules or network segmentation to limit exposure to trusted IP addresses only. Web application firewalls (WAFs) should be configured to detect and block suspicious file upload attempts, particularly those targeting the 'setrfidlist' parameter. Monitoring and logging of all upload activities on the affected endpoint should be enhanced to detect anomalous behavior promptly. Organizations should conduct thorough audits of existing uploaded files to identify any unauthorized or malicious content. If feasible, disabling or restricting the vulnerable functionality temporarily until a patch is available is recommended. Additionally, organizations should prepare incident response plans specific to this vulnerability and educate relevant personnel about the risks and detection methods. Finally, maintaining up-to-date backups and ensuring rapid recovery capabilities will mitigate potential damage from exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-12T14:04:45.082Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c5ada9e14ebf9f5cc7b7fb
Added to database: 9/13/2025, 5:45:13 PM
Last enriched: 9/13/2025, 6:00:12 PM
Last updated: 9/13/2025, 6:59:49 PM
Views: 3
Related Threats
CVE-2025-10384: Improper Authorization in yangzongzhuan RuoYi
MediumCVE-2025-10374: Improper Authorization in Shenzhen Sixun Business Management System
MediumCVE-2025-10373: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-10372: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-10370: Cross Site Scripting in MiczFlor RPi-Jukebox-RFID
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.