Skip to main content

CVE-2025-48415: CWE-749 Exposed Dangerous Method or Function in eCharge Hardy Barth cPH2 / cPP2 charging stations

Medium
VulnerabilityCVE-2025-48415cvecve-2025-48415cwe-749
Published: Wed May 21 2025 (05/21/2025, 12:13:14 UTC)
Source: CVE
Vendor/Project: eCharge Hardy Barth
Product: cPH2 / cPP2 charging stations

Description

A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor  or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands.

AI-Powered Analysis

AILast updated: 07/06/2025, 04:56:52 UTC

Technical Analysis

CVE-2025-48415 is a medium-severity vulnerability affecting eCharge Hardy Barth cPH2 and cPP2 electric vehicle charging stations with firmware versions up to 2.2.0. The vulnerability arises from an exposed dangerous method or function (CWE-749) that allows an attacker to exploit a USB backdoor feature. Specifically, if an attacker connects a USB drive containing a specially crafted configuration file named "salia.ini" to the charging station, the device processes this file and executes embedded commands. These commands can manipulate device configurations, enable an SSH backdoor, or execute arbitrary operating system commands without requiring authentication or user interaction. The vulnerability is local (AV:L) and requires physical access to the device, but it has low attack complexity (AC:L) and no privileges or user interaction needed (PR:N/UI:N). While confidentiality is not impacted, the integrity of the device is severely compromised, allowing attackers to alter configurations and potentially control the device remotely. Availability is not directly affected. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 21, 2025, and is tracked under CWE-749, which relates to exposed dangerous methods or functions that can be misused by attackers. The CVSS v3.1 base score is 6.2, reflecting a medium severity level primarily due to the requirement of physical access and the lack of confidentiality impact.

Potential Impact

For European organizations deploying eCharge Hardy Barth cPH2 and cPP2 charging stations, this vulnerability poses a significant risk to the integrity and security of their EV charging infrastructure. Attackers with physical access could manipulate charging station configurations, potentially enabling unauthorized remote access via SSH backdoors. This could lead to unauthorized control over charging operations, data manipulation, or pivoting into internal networks if the charging stations are connected to corporate systems. Given the increasing adoption of EV infrastructure across Europe, especially in countries with strong EV market penetration and green energy initiatives, compromised charging stations could disrupt service availability indirectly by undermining trust or causing operational issues. Additionally, attackers could leverage the backdoor to conduct further attacks on connected networks, potentially impacting critical infrastructure. The lack of confidentiality impact reduces the risk of data leakage, but the integrity compromise and potential for remote control elevate the threat to a medium-high concern for organizations relying on these devices for public or private EV charging services.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately restrict physical access to charging stations to trusted personnel only, employing physical security controls such as locked enclosures or surveillance. 2) Monitor and control USB port usage on charging stations, disabling USB ports if possible or using USB port locks to prevent unauthorized device connections. 3) Implement network segmentation to isolate charging stations from critical internal networks, limiting the potential impact of a compromised device. 4) Regularly audit device configurations and logs for signs of unauthorized changes or SSH backdoor activations. 5) Engage with eCharge Hardy Barth for firmware updates or patches addressing this vulnerability; if none are available, consider temporary operational controls such as disabling USB functionality or deploying compensating controls. 6) Train staff on the risks associated with physical access to charging infrastructure and the importance of securing USB interfaces. 7) Develop incident response plans specific to EV charging infrastructure compromise scenarios to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEC-VLab
Date Reserved
2025-05-20T07:34:22.865Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682dc591c4522896dcbfc973

Added to database: 5/21/2025, 12:22:41 PM

Last enriched: 7/6/2025, 4:56:52 AM

Last updated: 7/30/2025, 4:08:44 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats