🎯Basically, there are serious flaws in the Hardy Barth EV charger that could let hackers take control.
What Happened
Recent advisories have revealed significant vulnerabilities in the Hardy Barth Salia EV Charge Controller. These flaws, identified as CVE-2025-5873 and CVE-2025-10371, can lead to remote code execution and potentially crash the device. The affected firmware versions are 2.3.81 and below.
The Flaw
The vulnerabilities stem from an unrestricted file upload capability in the device's web interface. This means that attackers can upload malicious files that the system may execute, leading to unauthorized access and control. The buffer overflow condition allows attackers to manipulate the system, making it a critical security risk.
What's at Risk
These vulnerabilities primarily affect the Energy and Transportation Systems sectors, as the Hardy Barth Salia EV Charge Controller is widely deployed in these critical infrastructure areas. If exploited, the consequences could be severe, impacting not just the devices but also the services they support.
Patch Status
As of now, there is no patch available from Hardy Barth. The company has not responded to requests for coordination from CISA, raising concerns about the urgency of addressing these vulnerabilities.
Immediate Actions
Organizations using the Hardy Barth Salia EV Charge Controller should take the following steps:
Containment
- 1.Minimize network exposure for these devices. Ensure they are not directly accessible from the Internet.
- 2.Isolate control systems from business networks using firewalls.
Remediation
- 3.When remote access is necessary, utilize secure methods like VPNs and ensure they are updated.
- 4.Conduct a thorough impact analysis and risk assessment before implementing any defensive measures.
Conclusion
The discovery of these vulnerabilities highlights the importance of maintaining robust security measures in critical infrastructure devices. Organizations must act swiftly to mitigate risks and protect their systems from potential exploitation.
🔒 Pro insight: The unrestricted file upload vulnerability is a classic attack vector; organizations should prioritize immediate isolation and monitoring of affected devices.

