CVE-2025-5873

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to upload arbitrary files to eCharge Hardy Barth Salia PLCC devices via the /firmware.php endpoint in the Web UI. Attackers can exploit this to upload malicious files, potentially leading to system compromise. All users of affected versions are vulnerable.

💻 Affected Systems

Products:
  • eCharge Hardy Barth Salia PLCC
Versions: Up to version 2.3.81
Operating Systems: Embedded/Linux-based
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Web UI component specifically through the /firmware.php endpoint with media parameter manipulation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover through remote code execution, data theft, or device bricking via malicious firmware upload.

🟠

Likely Case

Unauthorized file upload leading to web shell installation, data manipulation, or denial of service.

🟢

If Mitigated

Limited impact if file uploads are restricted to authenticated users and file types are strictly validated.

🌐 Internet-Facing: HIGH - Attack can be initiated remotely without authentication, making exposed devices immediate targets.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit, but requires network access to the device.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily weaponizable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider workarounds or replacement.

🔧 Temporary Workarounds

Block Web UI Access

linux

Restrict access to the device's Web UI using firewall rules or network segmentation.

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Unused Services

linux

Disable the Web UI service if not required for operation.

systemctl stop [webui_service_name]
systemctl disable [webui_service_name]

🧯 If You Can't Patch

  • Isolate affected devices in a separate network segment with strict access controls.
  • Implement web application firewall (WAF) rules to block requests to /firmware.php with suspicious parameters.

🔍 How to Verify

Check if Vulnerable:

Check device version via Web UI or SSH. If version is 2.3.81 or earlier, device is vulnerable.

Check Version:

Check Web UI interface or use device-specific CLI commands (varies by model).

Verify Fix Applied:

No official fix available. Verify workarounds by testing if /firmware.php endpoint is inaccessible or blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /firmware.php
  • File upload attempts with non-standard file extensions
  • Multiple failed or successful upload attempts from single IP

Network Indicators:

  • HTTP traffic to /firmware.php with media parameter manipulation
  • Unexpected outbound connections from device after upload

SIEM Query:

source="device_logs" AND (url="/firmware.php" OR method="POST") AND (user_agent CONTAINS "curl" OR user_agent CONTAINS "wget")

🔗 References

📤 Share & Export