CVE-2025-3881: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in eCharge Hardy Barth cPH2
eCharge Hardy Barth cPH2 check_req.php ntp Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of eCharge Hardy Barth cPH2 charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the ntp parameter provided to the check_req.php endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-23113.
AI Analysis
Technical Summary
CVE-2025-3881 is a critical security vulnerability identified in the eCharge Hardy Barth cPH2 electric vehicle charging station software, specifically affecting version 2.0.4. The vulnerability is classified as CWE-78, which corresponds to improper neutralization of special elements used in an OS command, commonly known as OS command injection. The flaw resides in the check_req.php endpoint, where the 'ntp' parameter is processed without adequate validation or sanitization before being passed to a system call. This lack of input validation allows an unauthenticated, network-adjacent attacker to inject arbitrary commands that the system executes with the privileges of the 'www-data' user. Exploitation does not require any authentication or user interaction, significantly lowering the barrier for attackers. The vulnerability has a high CVSS v3.0 base score of 8.8, reflecting its ease of exploitation and the severe impact on confidentiality, integrity, and availability. Successful exploitation could lead to remote code execution, enabling attackers to manipulate the charging station's software environment, potentially disrupt service, steal sensitive data, or pivot to other networked systems. Although no known exploits have been reported in the wild yet, the vulnerability's characteristics make it a high-risk target for attackers, especially given the critical infrastructure role of EV charging stations. The vulnerability was assigned and published by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-23113, with the official CVE published on May 22, 2025.
Potential Impact
For European organizations, the impact of this vulnerability is significant due to the increasing deployment of eCharge Hardy Barth cPH2 charging stations across the continent as part of the growing electric vehicle infrastructure. Exploitation could lead to unauthorized remote code execution on charging stations, resulting in service disruptions that affect EV users and potentially cause cascading effects on energy management systems. Confidentiality breaches could expose operational data or user information, while integrity compromises might allow attackers to manipulate charging parameters or firmware, leading to safety risks or financial losses. Availability impacts could disrupt charging availability, undermining trust in EV infrastructure. Moreover, compromised charging stations could serve as footholds for lateral movement into corporate or utility networks, amplifying the threat to critical infrastructure. Given the strategic push in Europe towards sustainable transportation, such vulnerabilities pose risks not only to private companies operating charging networks but also to public entities and consumers relying on these services.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize updating the eCharge Hardy Barth cPH2 software to a patched version once available from the vendor. Until a patch is released, network segmentation should be enforced to isolate charging stations from critical internal networks, limiting attacker lateral movement. Implement strict firewall rules to restrict access to the check_req.php endpoint, allowing only trusted management systems where feasible. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious command injection patterns targeting the ntp parameter. Additionally, consider deploying web application firewalls (WAFs) capable of detecting and blocking OS command injection attempts. Regularly audit and monitor logs for anomalous activities related to charging station endpoints. Organizations should also engage with the vendor for timely security updates and verify the integrity of deployed charging station firmware and software. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment and remediation if exploitation is detected.
Affected Countries
Germany, France, Netherlands, Norway, Sweden, United Kingdom
CVE-2025-3881: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in eCharge Hardy Barth cPH2
Description
eCharge Hardy Barth cPH2 check_req.php ntp Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of eCharge Hardy Barth cPH2 charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the ntp parameter provided to the check_req.php endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-23113.
AI-Powered Analysis
Technical Analysis
CVE-2025-3881 is a critical security vulnerability identified in the eCharge Hardy Barth cPH2 electric vehicle charging station software, specifically affecting version 2.0.4. The vulnerability is classified as CWE-78, which corresponds to improper neutralization of special elements used in an OS command, commonly known as OS command injection. The flaw resides in the check_req.php endpoint, where the 'ntp' parameter is processed without adequate validation or sanitization before being passed to a system call. This lack of input validation allows an unauthenticated, network-adjacent attacker to inject arbitrary commands that the system executes with the privileges of the 'www-data' user. Exploitation does not require any authentication or user interaction, significantly lowering the barrier for attackers. The vulnerability has a high CVSS v3.0 base score of 8.8, reflecting its ease of exploitation and the severe impact on confidentiality, integrity, and availability. Successful exploitation could lead to remote code execution, enabling attackers to manipulate the charging station's software environment, potentially disrupt service, steal sensitive data, or pivot to other networked systems. Although no known exploits have been reported in the wild yet, the vulnerability's characteristics make it a high-risk target for attackers, especially given the critical infrastructure role of EV charging stations. The vulnerability was assigned and published by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-23113, with the official CVE published on May 22, 2025.
Potential Impact
For European organizations, the impact of this vulnerability is significant due to the increasing deployment of eCharge Hardy Barth cPH2 charging stations across the continent as part of the growing electric vehicle infrastructure. Exploitation could lead to unauthorized remote code execution on charging stations, resulting in service disruptions that affect EV users and potentially cause cascading effects on energy management systems. Confidentiality breaches could expose operational data or user information, while integrity compromises might allow attackers to manipulate charging parameters or firmware, leading to safety risks or financial losses. Availability impacts could disrupt charging availability, undermining trust in EV infrastructure. Moreover, compromised charging stations could serve as footholds for lateral movement into corporate or utility networks, amplifying the threat to critical infrastructure. Given the strategic push in Europe towards sustainable transportation, such vulnerabilities pose risks not only to private companies operating charging networks but also to public entities and consumers relying on these services.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize updating the eCharge Hardy Barth cPH2 software to a patched version once available from the vendor. Until a patch is released, network segmentation should be enforced to isolate charging stations from critical internal networks, limiting attacker lateral movement. Implement strict firewall rules to restrict access to the check_req.php endpoint, allowing only trusted management systems where feasible. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious command injection patterns targeting the ntp parameter. Additionally, consider deploying web application firewalls (WAFs) capable of detecting and blocking OS command injection attempts. Regularly audit and monitor logs for anomalous activities related to charging station endpoints. Organizations should also engage with the vendor for timely security updates and verify the integrity of deployed charging station firmware and software. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment and remediation if exploitation is detected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2025-04-22T21:42:34.959Z
- Cisa Enriched
- false
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 682e78df0acd01a249253214
Added to database: 5/22/2025, 1:07:43 AM
Last enriched: 7/7/2025, 9:57:29 AM
Last updated: 8/1/2025, 11:20:41 AM
Views: 13
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.