Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48414: CWE-798 Use of Hard-coded Credentials in eCharge Hardy Barth cPH2 / cPP2 charging stations

0
Medium
VulnerabilityCVE-2025-48414cvecve-2025-48414cwe-798
Published: Wed May 21 2025 (05/21/2025, 11:40:50 UTC)
Source: CVE
Vendor/Project: eCharge Hardy Barth
Product: cPH2 / cPP2 charging stations

Description

There are several scripts in the web interface that are accessible via undocumented hard-coded credentials. The scripts provide access to additional administrative/debug functionality and are likely intended for debugging during development and provides an additional attack surface.

AI-Powered Analysis

AILast updated: 11/04/2025, 01:29:35 UTC

Technical Analysis

CVE-2025-48414 identifies a security weakness in the eCharge Hardy Barth cPH2 and cPP2 electric vehicle charging stations, specifically in firmware versions up to and including 2.2.0. The vulnerability arises from the presence of hard-coded credentials embedded within several scripts accessible through the device's web interface. These credentials are undocumented, meaning they are not disclosed in official documentation or user manuals, and were likely implemented to facilitate debugging and administrative tasks during development. However, their presence in production firmware creates an unintended backdoor, allowing an attacker to gain elevated access without requiring legitimate authentication. The scripts accessible via these credentials expose additional administrative and debugging functionalities, which could be leveraged to gather sensitive information or alter device configurations. The vulnerability is remotely exploitable over the network without any user interaction, increasing the risk of automated or opportunistic attacks. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N), the attack complexity is low, no privileges or user interaction are required, and the scope is unchanged. The impact primarily affects confidentiality and integrity, as attackers could potentially access sensitive data or modify settings, but it does not directly impact availability. No public exploits or patches are currently known, indicating that organizations should proactively assess their exposure and implement compensating controls. The vulnerability falls under CWE-798, which concerns the use of hard-coded credentials, a common and critical security flaw that undermines authentication mechanisms and increases the attack surface.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security and integrity of electric vehicle charging infrastructure. Unauthorized access to administrative and debugging functions could enable attackers to manipulate charging station configurations, potentially leading to data leakage, unauthorized usage, or disruption of charging services indirectly through configuration tampering. While availability is not directly impacted, integrity compromises could affect billing accuracy or operational parameters, undermining trust in EV infrastructure. Given the increasing reliance on EV charging stations as critical infrastructure in Europe’s green energy transition, exploitation could have cascading effects on energy management and user confidence. Additionally, attackers could use compromised stations as footholds for lateral movement within organizational networks if these devices are connected to internal systems. The lack of authentication and user interaction requirements means attacks could be automated and widespread if the vulnerability is discovered by malicious actors. Organizations operating these devices must consider the potential regulatory and reputational consequences of breaches involving critical infrastructure components.

Mitigation Recommendations

Immediate mitigation should include network segmentation to isolate charging stations from critical internal networks, limiting exposure to potential attackers. Organizations should implement strict firewall rules to restrict access to the web interface of the charging stations to trusted management networks only. Monitoring and logging access attempts to these devices should be enhanced to detect unauthorized access early. Since no official patches are currently available, organizations should contact eCharge Hardy Barth for guidance and potential firmware updates addressing this issue. If possible, disable or restrict access to the undocumented scripts or web interface features associated with the hard-coded credentials. Employ network intrusion detection systems (NIDS) to identify anomalous traffic patterns targeting these devices. Additionally, organizations should conduct regular security assessments and penetration tests focusing on EV charging infrastructure to identify and remediate similar vulnerabilities. Finally, maintain awareness of vendor advisories and apply patches promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEC-VLab
Date Reserved
2025-05-20T07:34:22.865Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682dbe9bc4522896dcbfc038

Added to database: 5/21/2025, 11:52:59 AM

Last enriched: 11/4/2025, 1:29:35 AM

Last updated: 11/22/2025, 7:34:30 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats