CVE-2025-27804: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in eCharge Hardy Barth cPH2 / cPP2 charging stations
Several OS command injection vulnerabilities exist in the device firmware in the /var/salia/mqtt.php script. By publishing a specially crafted message to a certain MQTT topic arbitrary OS commands can be executed with root permissions.
AI Analysis
Technical Summary
CVE-2025-27804 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) found in the firmware of eCharge Hardy Barth cPH2 and cPP2 electric vehicle charging stations, specifically in the /var/salia/mqtt.php script. This vulnerability allows an attacker to inject arbitrary operating system commands by publishing specially crafted messages to a particular MQTT topic. The commands execute with root privileges, granting full control over the device. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but does require privileges (PR:H) to publish to the MQTT topic, and no user interaction (UI:N) is needed. The vulnerability impacts confidentiality and integrity severely (C:H/I:H) but does not affect availability (A:N). The affected firmware versions are those up to and including 2.2.0. No patches or exploit code are currently publicly available, and no known exploitation in the wild has been reported. The vulnerability poses a significant risk to the security of EV charging infrastructure, potentially allowing attackers to manipulate charging station operations, extract sensitive data, or pivot into connected networks.
Potential Impact
For European organizations, this vulnerability threatens the security and reliability of electric vehicle charging infrastructure, which is critical for the ongoing transition to sustainable transport. Successful exploitation could lead to unauthorized control over charging stations, enabling attackers to disrupt services, manipulate billing data, or use the compromised devices as entry points into corporate or utility networks. This could result in data breaches, operational disruptions, and reputational damage. Given the root-level access, attackers could also install persistent malware or launch lateral attacks. The impact is particularly significant in countries with dense EV infrastructure and widespread deployment of eCharge Hardy Barth devices, potentially affecting public charging networks, fleet operators, and energy providers. The vulnerability could also undermine trust in EV infrastructure security, slowing adoption rates.
Mitigation Recommendations
Organizations should immediately verify the firmware versions of their eCharge Hardy Barth cPH2 and cPP2 charging stations and plan for prompt updates once patches become available. Until patches are released, network-level mitigations are critical: restrict MQTT topic access to trusted and authenticated users only, enforce strong authentication and authorization mechanisms on MQTT brokers, and segment charging station networks from critical corporate or utility infrastructure. Monitoring MQTT traffic for unusual or malformed messages can help detect attempted exploitation. Employing intrusion detection systems with signatures for MQTT anomalies is recommended. Additionally, disable or limit unnecessary MQTT topics and services on the devices. Vendors and operators should collaborate to accelerate patch development and deployment. Regular security audits of charging infrastructure and incident response plans tailored to IoT and OT environments will enhance resilience.
Affected Countries
Germany, Netherlands, France, Belgium, Austria, Switzerland
CVE-2025-27804: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in eCharge Hardy Barth cPH2 / cPP2 charging stations
Description
Several OS command injection vulnerabilities exist in the device firmware in the /var/salia/mqtt.php script. By publishing a specially crafted message to a certain MQTT topic arbitrary OS commands can be executed with root permissions.
AI-Powered Analysis
Technical Analysis
CVE-2025-27804 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) found in the firmware of eCharge Hardy Barth cPH2 and cPP2 electric vehicle charging stations, specifically in the /var/salia/mqtt.php script. This vulnerability allows an attacker to inject arbitrary operating system commands by publishing specially crafted messages to a particular MQTT topic. The commands execute with root privileges, granting full control over the device. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but does require privileges (PR:H) to publish to the MQTT topic, and no user interaction (UI:N) is needed. The vulnerability impacts confidentiality and integrity severely (C:H/I:H) but does not affect availability (A:N). The affected firmware versions are those up to and including 2.2.0. No patches or exploit code are currently publicly available, and no known exploitation in the wild has been reported. The vulnerability poses a significant risk to the security of EV charging infrastructure, potentially allowing attackers to manipulate charging station operations, extract sensitive data, or pivot into connected networks.
Potential Impact
For European organizations, this vulnerability threatens the security and reliability of electric vehicle charging infrastructure, which is critical for the ongoing transition to sustainable transport. Successful exploitation could lead to unauthorized control over charging stations, enabling attackers to disrupt services, manipulate billing data, or use the compromised devices as entry points into corporate or utility networks. This could result in data breaches, operational disruptions, and reputational damage. Given the root-level access, attackers could also install persistent malware or launch lateral attacks. The impact is particularly significant in countries with dense EV infrastructure and widespread deployment of eCharge Hardy Barth devices, potentially affecting public charging networks, fleet operators, and energy providers. The vulnerability could also undermine trust in EV infrastructure security, slowing adoption rates.
Mitigation Recommendations
Organizations should immediately verify the firmware versions of their eCharge Hardy Barth cPH2 and cPP2 charging stations and plan for prompt updates once patches become available. Until patches are released, network-level mitigations are critical: restrict MQTT topic access to trusted and authenticated users only, enforce strong authentication and authorization mechanisms on MQTT brokers, and segment charging station networks from critical corporate or utility infrastructure. Monitoring MQTT traffic for unusual or malformed messages can help detect attempted exploitation. Employing intrusion detection systems with signatures for MQTT anomalies is recommended. Additionally, disable or limit unnecessary MQTT topics and services on the devices. Vendors and operators should collaborate to accelerate patch development and deployment. Regular security audits of charging infrastructure and incident response plans tailored to IoT and OT environments will enhance resilience.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-03-07T06:46:34.309Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682dbe9bc4522896dcbfc03a
Added to database: 5/21/2025, 11:52:59 AM
Last enriched: 11/4/2025, 2:29:29 AM
Last updated: 11/20/2025, 3:10:46 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13449: SQL Injection in code-projects Online Shop Project
MediumCVE-2025-13446: Stack-based Buffer Overflow in Tenda AC21
HighApplication Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
MediumCVE-2025-13445: Stack-based Buffer Overflow in Tenda AC21
HighCVE-2025-13443: Improper Access Controls in macrozheng mall
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.