The `/etc/passwd` and `/etc/shadow` files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell).
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://r.sec-consult.com/echarge |     | 
History
                    Wed, 21 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | cvssV3_1 
 
 | 
Wed, 21 May 2025 11:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The `/etc/passwd` and `/etc/shadow` files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell). | |
| Title | Hard-coded OS root credentials in eCharge Hardy Barth cPH2 / cPP2 charging stations | |
| Weaknesses | CWE-798 | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: SEC-VLab
Published: 2025-05-21T11:39:19.438Z
Updated: 2025-05-21T14:59:10.678Z
Reserved: 2025-05-20T07:34:22.865Z
Link: CVE-2025-48413
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-05-21T14:54:55.490Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-05-21T12:16:22.170
Modified: 2025-05-21T20:24:58.133
Link: CVE-2025-48413
 Redhat
                        Redhat
                    No data.