CVE-2025-48415: CWE-749 Exposed Dangerous Method or Function in eCharge Hardy Barth cPH2 / cPP2 charging stations
A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands.
AI Analysis
Technical Summary
CVE-2025-48415 is a medium-severity vulnerability affecting eCharge Hardy Barth cPH2 and cPP2 electric vehicle charging stations with firmware versions up to 2.2.0. The vulnerability arises from an exposed dangerous method or function (CWE-749) that allows an attacker to exploit a USB backdoor feature. Specifically, if an attacker connects a USB drive containing a specially crafted configuration file named "salia.ini" to the charging station, the device processes this file and executes embedded commands. These commands can manipulate device configurations, enable an SSH backdoor, or execute arbitrary operating system commands without requiring authentication or user interaction. The vulnerability is local (AV:L) and requires physical access to the device, but it has low attack complexity (AC:L) and no privileges or user interaction needed (PR:N/UI:N). While confidentiality is not impacted, the integrity of the device is severely compromised, allowing attackers to alter configurations and potentially control the device remotely. Availability is not directly affected. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 21, 2025, and is tracked under CWE-749, which relates to exposed dangerous methods or functions that can be misused by attackers. The CVSS v3.1 base score is 6.2, reflecting a medium severity level primarily due to the requirement of physical access and the lack of confidentiality impact.
Potential Impact
For European organizations deploying eCharge Hardy Barth cPH2 and cPP2 charging stations, this vulnerability poses a significant risk to the integrity and security of their EV charging infrastructure. Attackers with physical access could manipulate charging station configurations, potentially enabling unauthorized remote access via SSH backdoors. This could lead to unauthorized control over charging operations, data manipulation, or pivoting into internal networks if the charging stations are connected to corporate systems. Given the increasing adoption of EV infrastructure across Europe, especially in countries with strong EV market penetration and green energy initiatives, compromised charging stations could disrupt service availability indirectly by undermining trust or causing operational issues. Additionally, attackers could leverage the backdoor to conduct further attacks on connected networks, potentially impacting critical infrastructure. The lack of confidentiality impact reduces the risk of data leakage, but the integrity compromise and potential for remote control elevate the threat to a medium-high concern for organizations relying on these devices for public or private EV charging services.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately restrict physical access to charging stations to trusted personnel only, employing physical security controls such as locked enclosures or surveillance. 2) Monitor and control USB port usage on charging stations, disabling USB ports if possible or using USB port locks to prevent unauthorized device connections. 3) Implement network segmentation to isolate charging stations from critical internal networks, limiting the potential impact of a compromised device. 4) Regularly audit device configurations and logs for signs of unauthorized changes or SSH backdoor activations. 5) Engage with eCharge Hardy Barth for firmware updates or patches addressing this vulnerability; if none are available, consider temporary operational controls such as disabling USB functionality or deploying compensating controls. 6) Train staff on the risks associated with physical access to charging infrastructure and the importance of securing USB interfaces. 7) Develop incident response plans specific to EV charging infrastructure compromise scenarios to enable rapid containment and remediation.
Affected Countries
Germany, France, Netherlands, Norway, Sweden, United Kingdom
CVE-2025-48415: CWE-749 Exposed Dangerous Method or Function in eCharge Hardy Barth cPH2 / cPP2 charging stations
Description
A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands.
AI-Powered Analysis
Technical Analysis
CVE-2025-48415 is a medium-severity vulnerability affecting eCharge Hardy Barth cPH2 and cPP2 electric vehicle charging stations with firmware versions up to 2.2.0. The vulnerability arises from an exposed dangerous method or function (CWE-749) that allows an attacker to exploit a USB backdoor feature. Specifically, if an attacker connects a USB drive containing a specially crafted configuration file named "salia.ini" to the charging station, the device processes this file and executes embedded commands. These commands can manipulate device configurations, enable an SSH backdoor, or execute arbitrary operating system commands without requiring authentication or user interaction. The vulnerability is local (AV:L) and requires physical access to the device, but it has low attack complexity (AC:L) and no privileges or user interaction needed (PR:N/UI:N). While confidentiality is not impacted, the integrity of the device is severely compromised, allowing attackers to alter configurations and potentially control the device remotely. Availability is not directly affected. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 21, 2025, and is tracked under CWE-749, which relates to exposed dangerous methods or functions that can be misused by attackers. The CVSS v3.1 base score is 6.2, reflecting a medium severity level primarily due to the requirement of physical access and the lack of confidentiality impact.
Potential Impact
For European organizations deploying eCharge Hardy Barth cPH2 and cPP2 charging stations, this vulnerability poses a significant risk to the integrity and security of their EV charging infrastructure. Attackers with physical access could manipulate charging station configurations, potentially enabling unauthorized remote access via SSH backdoors. This could lead to unauthorized control over charging operations, data manipulation, or pivoting into internal networks if the charging stations are connected to corporate systems. Given the increasing adoption of EV infrastructure across Europe, especially in countries with strong EV market penetration and green energy initiatives, compromised charging stations could disrupt service availability indirectly by undermining trust or causing operational issues. Additionally, attackers could leverage the backdoor to conduct further attacks on connected networks, potentially impacting critical infrastructure. The lack of confidentiality impact reduces the risk of data leakage, but the integrity compromise and potential for remote control elevate the threat to a medium-high concern for organizations relying on these devices for public or private EV charging services.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately restrict physical access to charging stations to trusted personnel only, employing physical security controls such as locked enclosures or surveillance. 2) Monitor and control USB port usage on charging stations, disabling USB ports if possible or using USB port locks to prevent unauthorized device connections. 3) Implement network segmentation to isolate charging stations from critical internal networks, limiting the potential impact of a compromised device. 4) Regularly audit device configurations and logs for signs of unauthorized changes or SSH backdoor activations. 5) Engage with eCharge Hardy Barth for firmware updates or patches addressing this vulnerability; if none are available, consider temporary operational controls such as disabling USB functionality or deploying compensating controls. 6) Train staff on the risks associated with physical access to charging infrastructure and the importance of securing USB interfaces. 7) Develop incident response plans specific to EV charging infrastructure compromise scenarios to enable rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-05-20T07:34:22.865Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682dc591c4522896dcbfc973
Added to database: 5/21/2025, 12:22:41 PM
Last enriched: 7/6/2025, 4:56:52 AM
Last updated: 7/30/2025, 4:08:44 PM
Views: 8
Related Threats
CVE-2025-8959: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Shared library
HighCVE-2025-44201
UnknownCVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.