The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://r.sec-consult.com/echarge |
![]() ![]() |
History
Wed, 21 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Wed, 21 May 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates. | |
Title | Hard-Coded Certificate and Private Key for HTTPS Web Interface in eCharge Hardy Barth cPH2 / cPP2 charging stations | |
Weaknesses | CWE-321 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published: 2025-05-21T12:30:08.012Z
Updated: 2025-05-21T13:51:37.636Z
Reserved: 2025-05-20T07:34:22.865Z
Link: CVE-2025-48417

Updated: 2025-05-21T13:49:08.483Z

Status : Awaiting Analysis
Published: 2025-05-21T13:16:03.080
Modified: 2025-05-21T20:24:58.133
Link: CVE-2025-48417

No data.