Metrics
Affected Vendors & Products
Solution
The vendor has not yet released a patch or communicated a timeline for firmware updates.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://r.sec-consult.com/echarge |
![]() ![]() |
Wed, 21 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Wed, 21 May 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands. | |
Title | Backdoor Functionality via USB Drive in eCharge Hardy Barth cPH2 / cPP2 charging stations | |
Weaknesses | CWE-749 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-05-21T15:34:08.197Z
Reserved: 2025-05-20T07:34:22.865Z
Link: CVE-2025-48415

Updated: 2025-05-21T15:33:32.017Z

Status : Awaiting Analysis
Published: 2025-05-21T13:16:02.810
Modified: 2025-05-21T20:24:58.133
Link: CVE-2025-48415

No data.

No data.