Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48415: CWE-749 Exposed Dangerous Method or Function in eCharge Hardy Barth cPH2 / cPP2 charging stations

0
Medium
VulnerabilityCVE-2025-48415cvecve-2025-48415cwe-749
Published: Wed May 21 2025 (05/21/2025, 12:13:14 UTC)
Source: CVE
Vendor/Project: eCharge Hardy Barth
Product: cPH2 / cPP2 charging stations

Description

A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor  or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands.

AI-Powered Analysis

AILast updated: 11/04/2025, 01:29:50 UTC

Technical Analysis

CVE-2025-48415 is a vulnerability identified in eCharge Hardy Barth's cPH2 and cPP2 electric vehicle charging stations, specifically in firmware versions up to 2.2.0. The flaw arises from an exposed dangerous method or function (CWE-749) that manifests as a USB backdoor feature. When an attacker inserts a USB drive containing a specially crafted 'salia.ini' configuration file, the charging station parses this file and executes embedded commands without authentication or user interaction. These commands can export or modify the device's configuration, enable an SSH backdoor for persistent remote access, and execute arbitrary operating system commands. The attack vector is local (physical USB access), requiring no privileges or user interaction, which lowers the barrier for exploitation if physical access is obtained. The vulnerability does not impact confidentiality directly but severely compromises integrity by allowing unauthorized configuration changes and command execution. Availability is not directly affected. The CVSS 3.1 score of 6.2 reflects the medium severity, considering the local attack vector and high impact on integrity. No public exploits have been reported yet, but the potential for attackers to gain administrative control and establish persistent backdoors makes this a critical concern for operators of these charging stations. The lack of available patches at the time of disclosure necessitates immediate compensating controls to prevent exploitation.

Potential Impact

The primary impact of CVE-2025-48415 is the unauthorized administrative control over affected charging stations, which can lead to manipulation of device configurations and execution of arbitrary OS commands. For European organizations, this can disrupt EV charging infrastructure integrity, potentially leading to operational disruptions or unauthorized access to connected networks if the charging stations are networked. Attackers could enable SSH backdoors, facilitating persistent remote access and lateral movement within organizational networks. This risk is particularly acute for public or private EV charging operators, utilities, and smart city infrastructure providers. While confidentiality is not directly compromised, the integrity and trustworthiness of critical EV infrastructure are at risk, which could undermine user confidence and regulatory compliance. Additionally, compromised charging stations could be leveraged as entry points for broader cyberattacks against critical infrastructure. The medium severity rating suggests a significant but not catastrophic risk, emphasizing the need for timely mitigation to prevent escalation.

Mitigation Recommendations

1. Restrict physical access to charging stations by deploying them in secured or monitored locations to prevent unauthorized USB device insertion. 2. Implement strict USB device control policies, including disabling USB ports where possible or using endpoint security solutions that whitelist authorized USB devices. 3. Monitor charging station logs and network traffic for unusual configuration changes or SSH access attempts indicative of exploitation. 4. Coordinate with eCharge Hardy Barth for firmware updates or patches addressing this vulnerability and apply them promptly once available. 5. Conduct regular security audits of charging station configurations and network segmentation to limit potential lateral movement from compromised devices. 6. Educate maintenance and operational staff about the risks of unauthorized USB devices and enforce strict procedures for USB usage. 7. Consider deploying intrusion detection systems tailored to detect anomalous commands or backdoor activations on charging station management interfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEC-VLab
Date Reserved
2025-05-20T07:34:22.865Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682dc591c4522896dcbfc973

Added to database: 5/21/2025, 12:22:41 PM

Last enriched: 11/4/2025, 1:29:50 AM

Last updated: 11/22/2025, 4:47:38 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats