Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16010 | A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands. |
Solution
The vendor has not yet released a patch or communicated a timeline for firmware updates.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 21 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 21 May 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands. | |
| Title | Backdoor Functionality via USB Drive in eCharge Hardy Barth cPH2 / cPP2 charging stations | |
| Weaknesses | CWE-749 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T20:04:49.416Z
Reserved: 2025-05-20T07:34:22.865Z
Link: CVE-2025-48415
Updated: 2025-11-03T20:04:49.416Z
Status : Awaiting Analysis
Published: 2025-05-21T13:16:02.810
Modified: 2025-11-03T20:19:06.640
Link: CVE-2025-48415
No data.
OpenCVE Enrichment
No data.
EUVD