CVE-2025-10371

7.3 HIGH

📋 TL;DR

This vulnerability allows remote attackers to perform unrestricted file uploads via the /api.php endpoint in eCharge Hardy Barth Salia PLCC systems. Attackers can exploit the setrfidlist parameter to write arbitrary files to the system. All systems running versions up to 2.3.81 are affected.

💻 Affected Systems

Products:
  • eCharge Hardy Barth Salia PLCC
Versions: Up to version 2.3.81
Operating Systems: Unknown - Likely embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable /api.php endpoint accessible are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through remote code execution, data theft, or ransomware deployment via uploaded malicious files.

🟠

Likely Case

Unauthorized file upload leading to web shell installation, data manipulation, or denial of service.

🟢

If Mitigated

Limited impact if file uploads are restricted to non-executable directories with proper permissions.

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing systems immediate targets.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but require network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub demonstrates file write capability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider upgrading to any version above 2.3.81 if released by vendor.

🔧 Temporary Workarounds

Block /api.php Access

linux

Restrict access to the vulnerable endpoint using firewall rules or web server configuration.

iptables -A INPUT -p tcp --dport 80 -m string --string "/api.php" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/api.php" --algo bm -j DROP

Disable setrfidlist Parameter

all

Modify application configuration to reject or sanitize setrfidlist parameter inputs.

🧯 If You Can't Patch

  • Isolate affected systems from internet access using network segmentation.
  • Implement strict file upload validation and monitoring for unauthorized file writes.

🔍 How to Verify

Check if Vulnerable:

Check if /api.php endpoint accepts setrfidlist parameter and allows file uploads without proper validation.

Check Version:

Check system documentation or web interface for version information (typically displays in admin panel).

Verify Fix Applied:

Test that /api.php endpoint no longer accepts unrestricted file uploads via setrfidlist parameter.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /api.php with setrfidlist parameter
  • File creation events in unexpected directories
  • Web shell or malicious file upload attempts

Network Indicators:

  • HTTP requests to /api.php with file upload patterns
  • Unusual outbound connections from affected systems

SIEM Query:

source="web_logs" AND uri="/api.php" AND (method="POST" OR params CONTAINS "setrfidlist")

🔗 References

📤 Share & Export