CVE-2025-48415: CWE-749 Exposed Dangerous Method or Function in eCharge Hardy Barth cPH2 / cPP2 charging stations
A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands.
AI Analysis
Technical Summary
CVE-2025-48415 is a vulnerability identified in eCharge Hardy Barth's cPH2 and cPP2 electric vehicle charging stations, specifically in firmware versions up to 2.2.0. The flaw arises from an exposed dangerous method or function (CWE-749) that manifests as a USB backdoor feature. When an attacker inserts a USB drive containing a specially crafted 'salia.ini' configuration file, the charging station parses this file and executes embedded commands without authentication or user interaction. These commands can export or modify the device's configuration, enable an SSH backdoor for persistent remote access, and execute arbitrary operating system commands. The attack vector is local (physical USB access), requiring no privileges or user interaction, which lowers the barrier for exploitation if physical access is obtained. The vulnerability does not impact confidentiality directly but severely compromises integrity by allowing unauthorized configuration changes and command execution. Availability is not directly affected. The CVSS 3.1 score of 6.2 reflects the medium severity, considering the local attack vector and high impact on integrity. No public exploits have been reported yet, but the potential for attackers to gain administrative control and establish persistent backdoors makes this a critical concern for operators of these charging stations. The lack of available patches at the time of disclosure necessitates immediate compensating controls to prevent exploitation.
Potential Impact
The primary impact of CVE-2025-48415 is the unauthorized administrative control over affected charging stations, which can lead to manipulation of device configurations and execution of arbitrary OS commands. For European organizations, this can disrupt EV charging infrastructure integrity, potentially leading to operational disruptions or unauthorized access to connected networks if the charging stations are networked. Attackers could enable SSH backdoors, facilitating persistent remote access and lateral movement within organizational networks. This risk is particularly acute for public or private EV charging operators, utilities, and smart city infrastructure providers. While confidentiality is not directly compromised, the integrity and trustworthiness of critical EV infrastructure are at risk, which could undermine user confidence and regulatory compliance. Additionally, compromised charging stations could be leveraged as entry points for broader cyberattacks against critical infrastructure. The medium severity rating suggests a significant but not catastrophic risk, emphasizing the need for timely mitigation to prevent escalation.
Mitigation Recommendations
1. Restrict physical access to charging stations by deploying them in secured or monitored locations to prevent unauthorized USB device insertion. 2. Implement strict USB device control policies, including disabling USB ports where possible or using endpoint security solutions that whitelist authorized USB devices. 3. Monitor charging station logs and network traffic for unusual configuration changes or SSH access attempts indicative of exploitation. 4. Coordinate with eCharge Hardy Barth for firmware updates or patches addressing this vulnerability and apply them promptly once available. 5. Conduct regular security audits of charging station configurations and network segmentation to limit potential lateral movement from compromised devices. 6. Educate maintenance and operational staff about the risks of unauthorized USB devices and enforce strict procedures for USB usage. 7. Consider deploying intrusion detection systems tailored to detect anomalous commands or backdoor activations on charging station management interfaces.
Affected Countries
Germany, France, Netherlands, Norway, Sweden, United Kingdom
CVE-2025-48415: CWE-749 Exposed Dangerous Method or Function in eCharge Hardy Barth cPH2 / cPP2 charging stations
Description
A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands.
AI-Powered Analysis
Technical Analysis
CVE-2025-48415 is a vulnerability identified in eCharge Hardy Barth's cPH2 and cPP2 electric vehicle charging stations, specifically in firmware versions up to 2.2.0. The flaw arises from an exposed dangerous method or function (CWE-749) that manifests as a USB backdoor feature. When an attacker inserts a USB drive containing a specially crafted 'salia.ini' configuration file, the charging station parses this file and executes embedded commands without authentication or user interaction. These commands can export or modify the device's configuration, enable an SSH backdoor for persistent remote access, and execute arbitrary operating system commands. The attack vector is local (physical USB access), requiring no privileges or user interaction, which lowers the barrier for exploitation if physical access is obtained. The vulnerability does not impact confidentiality directly but severely compromises integrity by allowing unauthorized configuration changes and command execution. Availability is not directly affected. The CVSS 3.1 score of 6.2 reflects the medium severity, considering the local attack vector and high impact on integrity. No public exploits have been reported yet, but the potential for attackers to gain administrative control and establish persistent backdoors makes this a critical concern for operators of these charging stations. The lack of available patches at the time of disclosure necessitates immediate compensating controls to prevent exploitation.
Potential Impact
The primary impact of CVE-2025-48415 is the unauthorized administrative control over affected charging stations, which can lead to manipulation of device configurations and execution of arbitrary OS commands. For European organizations, this can disrupt EV charging infrastructure integrity, potentially leading to operational disruptions or unauthorized access to connected networks if the charging stations are networked. Attackers could enable SSH backdoors, facilitating persistent remote access and lateral movement within organizational networks. This risk is particularly acute for public or private EV charging operators, utilities, and smart city infrastructure providers. While confidentiality is not directly compromised, the integrity and trustworthiness of critical EV infrastructure are at risk, which could undermine user confidence and regulatory compliance. Additionally, compromised charging stations could be leveraged as entry points for broader cyberattacks against critical infrastructure. The medium severity rating suggests a significant but not catastrophic risk, emphasizing the need for timely mitigation to prevent escalation.
Mitigation Recommendations
1. Restrict physical access to charging stations by deploying them in secured or monitored locations to prevent unauthorized USB device insertion. 2. Implement strict USB device control policies, including disabling USB ports where possible or using endpoint security solutions that whitelist authorized USB devices. 3. Monitor charging station logs and network traffic for unusual configuration changes or SSH access attempts indicative of exploitation. 4. Coordinate with eCharge Hardy Barth for firmware updates or patches addressing this vulnerability and apply them promptly once available. 5. Conduct regular security audits of charging station configurations and network segmentation to limit potential lateral movement from compromised devices. 6. Educate maintenance and operational staff about the risks of unauthorized USB devices and enforce strict procedures for USB usage. 7. Consider deploying intrusion detection systems tailored to detect anomalous commands or backdoor activations on charging station management interfaces.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-05-20T07:34:22.865Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682dc591c4522896dcbfc973
Added to database: 5/21/2025, 12:22:41 PM
Last enriched: 11/4/2025, 1:29:50 AM
Last updated: 1/7/2026, 8:45:31 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.