Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10371: Unrestricted Upload in eCharge Hardy Barth Salia PLCC

0
Medium
VulnerabilityCVE-2025-10371cvecve-2025-10371
Published: Sat Sep 13 2025 (09/13/2025, 17:32:06 UTC)
Source: CVE Database V5
Vendor/Project: eCharge Hardy Barth
Product: Salia PLCC

Description

A security flaw has been discovered in eCharge Hardy Barth Salia PLCC up to 2.3.81. This issue affects some unknown processing of the file /api.php. The manipulation of the argument setrfidlist results in unrestricted upload. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/09/2026, 10:35:34 UTC

Technical Analysis

The vulnerability identified as CVE-2025-10371 affects the eCharge Hardy Barth Salia PLCC product line up to version 2.3.81. It resides in the handling of the /api.php endpoint, specifically in the processing of the setrfidlist parameter. Due to insufficient validation or sanitization, attackers can upload arbitrary files without any authentication or user interaction. This unrestricted upload flaw can be exploited remotely over the network, allowing adversaries to place malicious payloads on the server. Potential consequences include remote code execution, unauthorized access, data theft, or disruption of services managed by the affected product. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity with network attack vector, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vendor was notified early but has not issued any response or patch, increasing the risk exposure. The exploit code has been publicly released, which raises the likelihood of active exploitation. The affected versions span a wide range from 2.3.0 through 2.3.81, indicating a long-standing issue. The lack of vendor response and patch availability necessitates immediate defensive measures by users of this product.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for those relying on eCharge Hardy Barth Salia PLCC in critical infrastructure sectors such as energy management, industrial control, or smart grid systems. Successful exploitation could lead to unauthorized system access, enabling attackers to deploy malware, disrupt operations, or exfiltrate sensitive data. This could result in operational downtime, financial losses, regulatory penalties under GDPR for data breaches, and damage to reputation. Since the vulnerability allows remote, unauthenticated file uploads, attackers can bypass perimeter defenses if the API endpoint is exposed. The broad range of affected versions suggests many deployments remain vulnerable. The absence of vendor patches increases the window of exposure. European entities with interconnected systems or compliance requirements face elevated risks from this flaw.

Mitigation Recommendations

Until an official patch is available, European organizations should implement the following mitigations: 1) Restrict network access to the /api.php endpoint by applying firewall rules or VPN-only access to limit exposure to trusted users and systems. 2) Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts targeting the setrfidlist parameter. 3) Monitor logs and network traffic for unusual activity related to file uploads or API usage. 4) Conduct thorough audits of existing uploaded files to identify and remove any unauthorized content. 5) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts. 6) Isolate affected systems from critical networks where possible to contain potential breaches. 7) Prepare incident response plans specific to this vulnerability. 8) Engage with the vendor for updates and consider alternative solutions if remediation is delayed. 9) Educate relevant personnel about the risk and signs of exploitation. These targeted actions go beyond generic advice and focus on containment and detection in the absence of patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T14:04:45.082Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c5ada9e14ebf9f5cc7b7fb

Added to database: 9/13/2025, 5:45:13 PM

Last enriched: 1/9/2026, 10:35:34 AM

Last updated: 2/4/2026, 12:03:55 AM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats