CVE-2025-48416: CWE-912 Hidden Functionality in eCharge Hardy Barth cPH2 / cPP2 charging stations
An OpenSSH daemon listens on TCP port 22. There is a hard-coded entry in the "/etc/shadow" file in the firmware image for the "root" user. However, in the default SSH configuration the "PermitRootLogin" is disabled, preventing the root user from logging in via SSH. This configuration can be bypassed/changed by an attacker through multiple paths though.
AI Analysis
Technical Summary
CVE-2025-48416 is a vulnerability identified in the firmware of eCharge Hardy Barth cPH2 and cPP2 electric vehicle charging stations, specifically versions 2.2.0 and earlier. The core issue stems from a hidden or hard-coded root user entry present in the /etc/shadow file within the device's firmware image. This entry allows for root-level authentication if accessed. The charging stations run an OpenSSH daemon on TCP port 22, which by default disables root login via the 'PermitRootLogin' setting. However, attackers can bypass or alter this configuration through multiple attack paths, potentially enabling direct root SSH access. This hidden functionality (classified under CWE-912) represents a backdoor-like condition that undermines the device’s security model. Exploiting this vulnerability does not require prior authentication or user interaction, and can be performed remotely over the network, though it requires overcoming some access control hurdles (reflected in the CVSS vector's high attack complexity). Successful exploitation grants attackers full control over the charging station, allowing them to manipulate charging operations, disrupt service availability, or use the device as a foothold for lateral movement within the network. No public exploits have been reported yet, but the vulnerability’s presence in critical infrastructure components like EV charging stations raises significant concerns. The lack of available patches at the time of publication necessitates immediate compensating controls. The vulnerability was reserved and published in May 2025 by SEC-VLab and assigned CVSS v3.1 score 8.1, indicating high severity with network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the security and reliability of EV charging infrastructure. Compromise of charging stations can lead to unauthorized control over charging sessions, potentially causing financial losses, service disruptions, or safety hazards. Attackers gaining root access could manipulate firmware or software to disable charging, cause physical damage, or use the compromised devices as pivot points to infiltrate broader enterprise or utility networks. Given the increasing reliance on EV infrastructure across Europe, such disruptions could affect critical transportation and energy sectors. Confidentiality breaches could expose sensitive operational data or user information. Integrity violations might allow attackers to falsify charging records or tamper with billing systems. Availability impacts could result in denial of service, affecting end-users and undermining trust in EV services. The threat is particularly acute for organizations managing large fleets or public charging networks, where scale amplifies potential damage. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency of mitigation.
Mitigation Recommendations
Immediate mitigation should focus on network-level protections, including strict segmentation of charging station networks from corporate and public networks to limit attacker access. Implement firewall rules to restrict SSH access to trusted management hosts only. Monitor network traffic for unusual SSH connection attempts or configuration changes. Since no patches are currently available, organizations should engage with eCharge Hardy Barth for firmware updates and security advisories. Employ intrusion detection systems tailored to detect anomalous behavior on charging stations. Regularly audit device configurations to ensure 'PermitRootLogin' remains disabled and verify no unauthorized changes have been made. Consider deploying multi-factor authentication on management interfaces if supported. Where possible, isolate charging stations in dedicated VLANs with limited inbound connectivity. Establish incident response plans specific to EV infrastructure compromise. Finally, maintain up-to-date asset inventories to quickly identify affected devices and prioritize remediation.
Affected Countries
Germany, France, Netherlands, Belgium, Sweden, Norway
CVE-2025-48416: CWE-912 Hidden Functionality in eCharge Hardy Barth cPH2 / cPP2 charging stations
Description
An OpenSSH daemon listens on TCP port 22. There is a hard-coded entry in the "/etc/shadow" file in the firmware image for the "root" user. However, in the default SSH configuration the "PermitRootLogin" is disabled, preventing the root user from logging in via SSH. This configuration can be bypassed/changed by an attacker through multiple paths though.
AI-Powered Analysis
Technical Analysis
CVE-2025-48416 is a vulnerability identified in the firmware of eCharge Hardy Barth cPH2 and cPP2 electric vehicle charging stations, specifically versions 2.2.0 and earlier. The core issue stems from a hidden or hard-coded root user entry present in the /etc/shadow file within the device's firmware image. This entry allows for root-level authentication if accessed. The charging stations run an OpenSSH daemon on TCP port 22, which by default disables root login via the 'PermitRootLogin' setting. However, attackers can bypass or alter this configuration through multiple attack paths, potentially enabling direct root SSH access. This hidden functionality (classified under CWE-912) represents a backdoor-like condition that undermines the device’s security model. Exploiting this vulnerability does not require prior authentication or user interaction, and can be performed remotely over the network, though it requires overcoming some access control hurdles (reflected in the CVSS vector's high attack complexity). Successful exploitation grants attackers full control over the charging station, allowing them to manipulate charging operations, disrupt service availability, or use the device as a foothold for lateral movement within the network. No public exploits have been reported yet, but the vulnerability’s presence in critical infrastructure components like EV charging stations raises significant concerns. The lack of available patches at the time of publication necessitates immediate compensating controls. The vulnerability was reserved and published in May 2025 by SEC-VLab and assigned CVSS v3.1 score 8.1, indicating high severity with network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the security and reliability of EV charging infrastructure. Compromise of charging stations can lead to unauthorized control over charging sessions, potentially causing financial losses, service disruptions, or safety hazards. Attackers gaining root access could manipulate firmware or software to disable charging, cause physical damage, or use the compromised devices as pivot points to infiltrate broader enterprise or utility networks. Given the increasing reliance on EV infrastructure across Europe, such disruptions could affect critical transportation and energy sectors. Confidentiality breaches could expose sensitive operational data or user information. Integrity violations might allow attackers to falsify charging records or tamper with billing systems. Availability impacts could result in denial of service, affecting end-users and undermining trust in EV services. The threat is particularly acute for organizations managing large fleets or public charging networks, where scale amplifies potential damage. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency of mitigation.
Mitigation Recommendations
Immediate mitigation should focus on network-level protections, including strict segmentation of charging station networks from corporate and public networks to limit attacker access. Implement firewall rules to restrict SSH access to trusted management hosts only. Monitor network traffic for unusual SSH connection attempts or configuration changes. Since no patches are currently available, organizations should engage with eCharge Hardy Barth for firmware updates and security advisories. Employ intrusion detection systems tailored to detect anomalous behavior on charging stations. Regularly audit device configurations to ensure 'PermitRootLogin' remains disabled and verify no unauthorized changes have been made. Consider deploying multi-factor authentication on management interfaces if supported. Where possible, isolate charging stations in dedicated VLANs with limited inbound connectivity. Establish incident response plans specific to EV infrastructure compromise. Finally, maintain up-to-date asset inventories to quickly identify affected devices and prioritize remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-05-20T07:34:22.865Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682dc591c4522896dcbfc975
Added to database: 5/21/2025, 12:22:41 PM
Last enriched: 11/4/2025, 1:30:08 AM
Last updated: 11/22/2025, 6:05:59 PM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.