Skip to main content

CVE-2025-3883: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in eCharge Hardy Barth cPH2

High
VulnerabilityCVE-2025-3883cvecve-2025-3883cwe-78
Published: Thu May 22 2025 (05/22/2025, 00:48:41 UTC)
Source: CVE
Vendor/Project: eCharge Hardy Barth
Product: cPH2

Description

eCharge Hardy Barth cPH2 index.php Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of eCharge Hardy Barth cPH2 charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of GET parameters provided to the index.php endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-23115.

AI-Powered Analysis

AILast updated: 07/07/2025, 10:11:42 UTC

Technical Analysis

CVE-2025-3883 is a critical security vulnerability classified under CWE-78, indicating an OS Command Injection flaw in the eCharge Hardy Barth cPH2 electric vehicle charging station software, specifically version 2.0.4. The vulnerability resides in the index.php endpoint, where GET parameters are improperly sanitized before being used in system calls. This lack of input validation allows a network-adjacent attacker to inject arbitrary OS commands that are executed with the privileges of the web server user (www-data). Notably, exploitation does not require authentication or user interaction, significantly increasing the risk. The vulnerability was publicly disclosed on May 22, 2025, with a CVSS v3.0 score of 8.8, reflecting high severity due to its impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation and the critical nature of the flaw make it a significant threat. The vulnerability could allow attackers to execute arbitrary code, potentially leading to full system compromise, data theft, disruption of charging services, or pivoting into broader network environments.

Potential Impact

For European organizations deploying eCharge Hardy Barth cPH2 charging stations, this vulnerability poses a substantial risk. Exploitation can lead to unauthorized control over charging infrastructure, potentially disrupting electric vehicle charging availability, which is critical as Europe advances its green energy and transportation initiatives. Confidential data related to user charging sessions or payment information could be exposed or manipulated. Furthermore, compromised charging stations could serve as entry points for lateral movement into corporate or municipal networks, amplifying the threat. The operational disruption could affect public and private charging networks, undermining trust and causing financial and reputational damage. Given the growing reliance on EV infrastructure in Europe, the impact extends beyond individual organizations to broader energy and transportation sectors.

Mitigation Recommendations

Immediate mitigation should focus on isolating affected charging stations from untrusted networks to reduce exposure. Network segmentation and strict firewall rules should limit access to the index.php endpoint only to trusted management systems. Since no official patch is currently available, organizations should implement Web Application Firewall (WAF) rules to detect and block suspicious command injection patterns in GET parameters targeting index.php. Monitoring logs for unusual system calls or web requests can help identify exploitation attempts early. Vendors and operators should prioritize developing and deploying patches or firmware updates to properly sanitize input parameters. Additionally, organizations should conduct thorough security assessments of their EV charging infrastructure and consider compensating controls such as disabling remote management interfaces if not required. Regularly updating and hardening the underlying operating system and web server environment can also reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-04-22T21:42:43.669Z
Cisa Enriched
false
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682e78df0acd01a249253218

Added to database: 5/22/2025, 1:07:43 AM

Last enriched: 7/7/2025, 10:11:42 AM

Last updated: 8/11/2025, 9:30:10 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats