The `/etc/passwd` and `/etc/shadow` files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell).
Metrics
Affected Vendors & Products
References
History
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 21 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 21 May 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The `/etc/passwd` and `/etc/shadow` files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell). | |
| Title | Hard-coded OS root credentials in eCharge Hardy Barth cPH2 / cPP2 charging stations | |
| Weaknesses | CWE-798 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published: 2025-05-21T11:39:19.438Z
Updated: 2025-11-03T20:04:46.631Z
Reserved: 2025-05-20T07:34:22.865Z
Link: CVE-2025-48413
Updated: 2025-11-03T20:04:46.631Z
Status : Awaiting Analysis
Published: 2025-05-21T12:16:22.170
Modified: 2025-11-03T20:19:06.377
Link: CVE-2025-48413
No data.