CVE-2025-48415: CWE-749 Exposed Dangerous Method or Function in eCharge Hardy Barth cPH2 / cPP2 charging stations
A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands.
AI Analysis
Technical Summary
CVE-2025-48415 is a vulnerability identified in eCharge Hardy Barth's cPH2 and cPP2 electric vehicle charging stations, specifically in firmware versions up to 2.2.0. The flaw arises from an exposed dangerous method or function (CWE-749) that manifests as a USB backdoor feature. When an attacker inserts a USB drive containing a specially crafted 'salia.ini' configuration file, the charging station parses this file and executes embedded commands without authentication or user interaction. These commands can export or modify the device's configuration, enable an SSH backdoor for persistent remote access, and execute arbitrary operating system commands. The attack vector is local (physical USB access), requiring no privileges or user interaction, which lowers the barrier for exploitation if physical access is obtained. The vulnerability does not impact confidentiality directly but severely compromises integrity by allowing unauthorized configuration changes and command execution. Availability is not directly affected. The CVSS 3.1 score of 6.2 reflects the medium severity, considering the local attack vector and high impact on integrity. No public exploits have been reported yet, but the potential for attackers to gain administrative control and establish persistent backdoors makes this a critical concern for operators of these charging stations. The lack of available patches at the time of disclosure necessitates immediate compensating controls to prevent exploitation.
Potential Impact
The primary impact of CVE-2025-48415 is the unauthorized administrative control over affected charging stations, which can lead to manipulation of device configurations and execution of arbitrary OS commands. For European organizations, this can disrupt EV charging infrastructure integrity, potentially leading to operational disruptions or unauthorized access to connected networks if the charging stations are networked. Attackers could enable SSH backdoors, facilitating persistent remote access and lateral movement within organizational networks. This risk is particularly acute for public or private EV charging operators, utilities, and smart city infrastructure providers. While confidentiality is not directly compromised, the integrity and trustworthiness of critical EV infrastructure are at risk, which could undermine user confidence and regulatory compliance. Additionally, compromised charging stations could be leveraged as entry points for broader cyberattacks against critical infrastructure. The medium severity rating suggests a significant but not catastrophic risk, emphasizing the need for timely mitigation to prevent escalation.
Mitigation Recommendations
1. Restrict physical access to charging stations by deploying them in secured or monitored locations to prevent unauthorized USB device insertion. 2. Implement strict USB device control policies, including disabling USB ports where possible or using endpoint security solutions that whitelist authorized USB devices. 3. Monitor charging station logs and network traffic for unusual configuration changes or SSH access attempts indicative of exploitation. 4. Coordinate with eCharge Hardy Barth for firmware updates or patches addressing this vulnerability and apply them promptly once available. 5. Conduct regular security audits of charging station configurations and network segmentation to limit potential lateral movement from compromised devices. 6. Educate maintenance and operational staff about the risks of unauthorized USB devices and enforce strict procedures for USB usage. 7. Consider deploying intrusion detection systems tailored to detect anomalous commands or backdoor activations on charging station management interfaces.
Affected Countries
Germany, France, Netherlands, Norway, Sweden, United Kingdom
CVE-2025-48415: CWE-749 Exposed Dangerous Method or Function in eCharge Hardy Barth cPH2 / cPP2 charging stations
Description
A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands.
AI-Powered Analysis
Technical Analysis
CVE-2025-48415 is a vulnerability identified in eCharge Hardy Barth's cPH2 and cPP2 electric vehicle charging stations, specifically in firmware versions up to 2.2.0. The flaw arises from an exposed dangerous method or function (CWE-749) that manifests as a USB backdoor feature. When an attacker inserts a USB drive containing a specially crafted 'salia.ini' configuration file, the charging station parses this file and executes embedded commands without authentication or user interaction. These commands can export or modify the device's configuration, enable an SSH backdoor for persistent remote access, and execute arbitrary operating system commands. The attack vector is local (physical USB access), requiring no privileges or user interaction, which lowers the barrier for exploitation if physical access is obtained. The vulnerability does not impact confidentiality directly but severely compromises integrity by allowing unauthorized configuration changes and command execution. Availability is not directly affected. The CVSS 3.1 score of 6.2 reflects the medium severity, considering the local attack vector and high impact on integrity. No public exploits have been reported yet, but the potential for attackers to gain administrative control and establish persistent backdoors makes this a critical concern for operators of these charging stations. The lack of available patches at the time of disclosure necessitates immediate compensating controls to prevent exploitation.
Potential Impact
The primary impact of CVE-2025-48415 is the unauthorized administrative control over affected charging stations, which can lead to manipulation of device configurations and execution of arbitrary OS commands. For European organizations, this can disrupt EV charging infrastructure integrity, potentially leading to operational disruptions or unauthorized access to connected networks if the charging stations are networked. Attackers could enable SSH backdoors, facilitating persistent remote access and lateral movement within organizational networks. This risk is particularly acute for public or private EV charging operators, utilities, and smart city infrastructure providers. While confidentiality is not directly compromised, the integrity and trustworthiness of critical EV infrastructure are at risk, which could undermine user confidence and regulatory compliance. Additionally, compromised charging stations could be leveraged as entry points for broader cyberattacks against critical infrastructure. The medium severity rating suggests a significant but not catastrophic risk, emphasizing the need for timely mitigation to prevent escalation.
Mitigation Recommendations
1. Restrict physical access to charging stations by deploying them in secured or monitored locations to prevent unauthorized USB device insertion. 2. Implement strict USB device control policies, including disabling USB ports where possible or using endpoint security solutions that whitelist authorized USB devices. 3. Monitor charging station logs and network traffic for unusual configuration changes or SSH access attempts indicative of exploitation. 4. Coordinate with eCharge Hardy Barth for firmware updates or patches addressing this vulnerability and apply them promptly once available. 5. Conduct regular security audits of charging station configurations and network segmentation to limit potential lateral movement from compromised devices. 6. Educate maintenance and operational staff about the risks of unauthorized USB devices and enforce strict procedures for USB usage. 7. Consider deploying intrusion detection systems tailored to detect anomalous commands or backdoor activations on charging station management interfaces.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-05-20T07:34:22.865Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682dc591c4522896dcbfc973
Added to database: 5/21/2025, 12:22:41 PM
Last enriched: 11/4/2025, 1:29:50 AM
Last updated: 11/22/2025, 4:47:38 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.