A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://r.sec-consult.com/echarge |
![]() ![]() |
History
Wed, 21 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Wed, 21 May 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands. | |
Title | Backdoor Functionality via USB Drive in eCharge Hardy Barth cPH2 / cPP2 charging stations | |
Weaknesses | CWE-749 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published: 2025-05-21T12:13:14.475Z
Updated: 2025-05-21T15:34:08.197Z
Reserved: 2025-05-20T07:34:22.865Z
Link: CVE-2025-48415

Updated: 2025-05-21T15:33:32.017Z

Status : Awaiting Analysis
Published: 2025-05-21T13:16:02.810
Modified: 2025-05-21T20:24:58.133
Link: CVE-2025-48415

No data.