Skip to main content

CVE-2025-10371: Unrestricted Upload in eCharge Hardy Barth Salia PLCC

Medium
VulnerabilityCVE-2025-10371cvecve-2025-10371
Published: Sat Sep 13 2025 (09/13/2025, 17:32:06 UTC)
Source: CVE Database V5
Vendor/Project: eCharge Hardy Barth
Product: Salia PLCC

Description

A security flaw has been discovered in eCharge Hardy Barth Salia PLCC 2.2.0. This issue affects some unknown processing of the file /api.php. The manipulation of the argument setrfidlist results in unrestricted upload. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/13/2025, 18:00:12 UTC

Technical Analysis

CVE-2025-10371 is a security vulnerability identified in version 2.2.0 of the eCharge Hardy Barth Salia PLCC product. The flaw resides in the handling of the /api.php endpoint, specifically in the processing of the 'setrfidlist' argument. This vulnerability allows an attacker to perform an unrestricted file upload remotely without any authentication or user interaction. The unrestricted upload means that an attacker can upload arbitrary files, potentially including malicious scripts or executables, to the server hosting the vulnerable application. This can lead to remote code execution, data compromise, or further system compromise depending on the nature of the uploaded files and the server configuration. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, with an attack vector of network (remote), low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vendor has been contacted but has not responded or provided a patch, and although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of exploitation. The lack of authentication and the ability to upload files unrestrictedly make this vulnerability particularly dangerous for exposed systems. The affected product, Salia PLCC, is likely used in environments related to e-mobility or charging infrastructure, given the vendor's profile, which could have operational implications if compromised.

Potential Impact

For European organizations, especially those involved in electric vehicle charging infrastructure or related sectors where eCharge Hardy Barth Salia PLCC is deployed, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access, remote code execution, and potential disruption of charging services. This could impact business continuity, cause reputational damage, and potentially expose sensitive operational data. Given the critical role of charging infrastructure in supporting the EU's green energy and transportation initiatives, disruption or compromise could have broader economic and environmental consequences. Additionally, compromised systems could be used as pivot points for further attacks within organizational networks. The medium severity rating does not diminish the practical risk, especially since no authentication is required and the exploit is publicly available. Organizations relying on this product without mitigations are at risk of targeted attacks or opportunistic exploitation.

Mitigation Recommendations

Since no official patch or vendor response is available, European organizations should implement compensating controls immediately. These include restricting network access to the /api.php endpoint by implementing strict firewall rules or network segmentation to limit exposure to trusted IP addresses only. Web application firewalls (WAFs) should be configured to detect and block suspicious file upload attempts, particularly those targeting the 'setrfidlist' parameter. Monitoring and logging of all upload activities on the affected endpoint should be enhanced to detect anomalous behavior promptly. Organizations should conduct thorough audits of existing uploaded files to identify any unauthorized or malicious content. If feasible, disabling or restricting the vulnerable functionality temporarily until a patch is available is recommended. Additionally, organizations should prepare incident response plans specific to this vulnerability and educate relevant personnel about the risks and detection methods. Finally, maintaining up-to-date backups and ensuring rapid recovery capabilities will mitigate potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T14:04:45.082Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c5ada9e14ebf9f5cc7b7fb

Added to database: 9/13/2025, 5:45:13 PM

Last enriched: 9/13/2025, 6:00:12 PM

Last updated: 9/13/2025, 6:59:49 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats