The `/etc/passwd` and `/etc/shadow` files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell).
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://r.sec-consult.com/echarge |
![]() ![]() |
History
Wed, 21 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Wed, 21 May 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The `/etc/passwd` and `/etc/shadow` files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell). | |
Title | Hard-coded OS root credentials in eCharge Hardy Barth cPH2 / cPP2 charging stations | |
Weaknesses | CWE-798 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published: 2025-05-21T11:39:19.438Z
Updated: 2025-05-21T14:59:10.678Z
Reserved: 2025-05-20T07:34:22.865Z
Link: CVE-2025-48413

Updated: 2025-05-21T14:54:55.490Z

Status : Awaiting Analysis
Published: 2025-05-21T12:16:22.170
Modified: 2025-05-21T20:24:58.133
Link: CVE-2025-48413

No data.