Skip to main content

CVE-2025-5873: Unrestricted Upload in eCharge Hardy Barth Salia PLCC

Medium
VulnerabilityCVE-2025-5873cvecve-2025-5873
Published: Mon Jun 09 2025 (06/09/2025, 10:31:04 UTC)
Source: CVE Database V5
Vendor/Project: eCharge Hardy Barth
Product: Salia PLCC

Description

A vulnerability was found in eCharge Hardy Barth Salia PLCC 2.2.0. It has been declared as critical. This vulnerability affects unknown code of the file /firmware.php of the component Web UI. The manipulation of the argument media leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/09/2025, 11:39:31 UTC

Technical Analysis

CVE-2025-5873 is a medium-severity vulnerability identified in the eCharge Hardy Barth Salia PLCC product, specifically version 2.2.0. The vulnerability resides in the web user interface component, within the /firmware.php file. It involves improper handling of the 'media' argument, which allows an attacker to perform an unrestricted file upload. This means that an attacker can remotely upload arbitrary files to the system without authentication or user interaction, potentially leading to unauthorized code execution or system compromise. The vulnerability is exploitable remotely over the network, with low attack complexity and no privileges or user interaction required. Although the CVSS 4.0 base score is 5.3 (medium), the unrestricted upload nature of the flaw presents a significant risk, as it can be leveraged to deploy malicious payloads such as web shells or ransomware. The vendor has been contacted but has not responded or issued a patch, and while no exploits are currently known to be in the wild, the public disclosure of the exploit code increases the likelihood of exploitation attempts. The vulnerability affects only version 2.2.0 of the product, and no mitigations or patches have been provided to date.

Potential Impact

For European organizations using the eCharge Hardy Barth Salia PLCC 2.2.0 product, this vulnerability poses a tangible risk to confidentiality, integrity, and availability. Successful exploitation could allow attackers to upload malicious files, leading to unauthorized access, data theft, or disruption of services. Given that the product is related to charging infrastructure (implied by the vendor and product name), organizations in sectors such as electric vehicle charging networks, energy providers, or smart infrastructure could face operational disruptions or compromise of critical systems. The lack of vendor response and patch availability increases exposure time, raising the risk of targeted attacks. Additionally, the ability to exploit remotely without authentication makes it easier for attackers to target vulnerable systems across networks. This could result in reputational damage, regulatory penalties under GDPR for data breaches, and financial losses due to service downtime or remediation costs.

Mitigation Recommendations

Since no official patch or vendor guidance is available, European organizations should implement the following specific mitigations: 1) Immediately isolate or restrict network access to the affected /firmware.php endpoint using web application firewalls (WAFs) or network segmentation to prevent unauthorized uploads. 2) Employ strict input validation and filtering at the perimeter to block suspicious file upload attempts targeting the 'media' parameter. 3) Monitor logs and network traffic for unusual POST requests to /firmware.php or attempts to upload files, enabling early detection of exploitation attempts. 4) If possible, downgrade or upgrade the product to a version not affected by this vulnerability, or consider temporary removal of the vulnerable component until a patch is released. 5) Implement application-layer authentication and access controls to restrict access to the web UI, even if the product does not enforce it by default. 6) Conduct internal vulnerability scans and penetration tests focused on this endpoint to identify exposure. 7) Prepare incident response plans specific to web shell or malware deployment scenarios stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-08T17:49:54.645Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6846c60d7b622a9fdf1e7915

Added to database: 6/9/2025, 11:31:25 AM

Last enriched: 7/9/2025, 11:39:31 AM

Last updated: 8/4/2025, 6:14:48 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats