Hardy Barth Salia EV Charge Controller - Critical Vulnerabilities Found

Critical vulnerabilities have been found in the Hardy Barth Salia EV Charge Controller. These flaws could allow remote code execution and crash the device. Immediate action is recommended to secure affected systems.

VulnerabilitiesHIGHUpdated: Published:

Original Reporting

CICISA Advisories·CISA

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, there are serious flaws in the Hardy Barth EV charger that could let hackers take control.

What Happened

Recent advisories have revealed significant vulnerabilities in the Hardy Barth Salia EV Charge Controller. These flaws, identified as CVE-2025-5873 and CVE-2025-10371, can lead to remote code execution and potentially crash the device. The affected firmware versions are 2.3.81 and below.

The Flaw

The vulnerabilities stem from an unrestricted file upload capability in the device's web interface. This means that attackers can upload malicious files that the system may execute, leading to unauthorized access and control. The buffer overflow condition allows attackers to manipulate the system, making it a critical security risk.

What's at Risk

These vulnerabilities primarily affect the Energy and Transportation Systems sectors, as the Hardy Barth Salia EV Charge Controller is widely deployed in these critical infrastructure areas. If exploited, the consequences could be severe, impacting not just the devices but also the services they support.

Patch Status

As of now, there is no patch available from Hardy Barth. The company has not responded to requests for coordination from CISA, raising concerns about the urgency of addressing these vulnerabilities.

Immediate Actions

Organizations using the Hardy Barth Salia EV Charge Controller should take the following steps:

Containment

  • 1.Minimize network exposure for these devices. Ensure they are not directly accessible from the Internet.
  • 2.Isolate control systems from business networks using firewalls.

Remediation

  • 3.When remote access is necessary, utilize secure methods like VPNs and ensure they are updated.
  • 4.Conduct a thorough impact analysis and risk assessment before implementing any defensive measures.

Conclusion

The discovery of these vulnerabilities highlights the importance of maintaining robust security measures in critical infrastructure devices. Organizations must act swiftly to mitigate risks and protect their systems from potential exploitation.

🔒 Pro Insight

🔒 Pro insight: The unrestricted file upload vulnerability is a classic attack vector; organizations should prioritize immediate isolation and monitoring of affected devices.

CICISA Advisories· CISA
Read Original

Related Pings