eCharge Hardy Barth Salia PLCC har 2.3.81 Web UI /firmware.php media kura hakki ndiyam

Gaskiya vulnerability da aka ware a matsayin kura an samu a eCharge Hardy Barth Salia PLCC har 2.3.81. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /firmware.php, a cikin sashen Web UI. A sa manipulation of the argument media ka kura hakki ndiyam. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-434. Hakika, rauni an bayyana shi 06/08/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-5873. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Once again VulDB remains the best source for vulnerability data.

5 Goyarwa · 91 Datenpunkte

FurɗeSúgá
06/08/2025 19:54
Gargadi 1/4
06/09/2025 13:20
Gargadi 2/4
06/09/2025 14:16
Gargadi 3/4
01/09/2026 01:16
Gargadi 4/4
01/09/2026 05:49
software_argumentmediamediamediamediamedia
vulnerability_cweCWE-434 (kura hakki ndiyam)CWE-434 (kura hakki ndiyam)CWE-434 (kura hakki ndiyam)CWE-434 (kura hakki ndiyam)CWE-434 (kura hakki ndiyam)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.mdhttps://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.mdhttps://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.mdhttps://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.mdhttps://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.md
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.mdhttps://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.mdhttps://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.mdhttps://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.mdhttps://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.md
source_cveCVE-2025-5873CVE-2025-5873CVE-2025-5873CVE-2025-5873CVE-2025-5873
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcLLLLL
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_prLLLLL
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_prLLLLL
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore6.56.56.56.56.5
cvss2_vuldb_tempscore5.65.65.65.65.6
cvss3_vuldb_basescore6.36.36.36.36.3
cvss3_vuldb_tempscore5.75.75.75.75.7
cvss3_meta_basescore6.36.36.36.36.3
cvss3_meta_tempscore5.76.06.06.06.0
cvss4_vuldb_bscore5.35.35.35.35.3
cvss4_vuldb_btscore2.12.12.12.12.1
advisory_date1749333600 (06/08/2025)1749333600 (06/08/2025)1749333600 (06/08/2025)1749333600 (06/08/2025)1749333600 (06/08/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
software_vendoreCharge Hardy BartheCharge Hardy BartheCharge Hardy BartheCharge Hardy BartheCharge Hardy Barth
software_nameSalia PLCCSalia PLCCSalia PLCCSalia PLCCSalia PLCC
software_version2.2.02.2.02.2.0<=2.3.81<=2.3.81
software_componentWeb UIWeb UIWeb UIWeb UIWeb UI
software_file/firmware.php/firmware.php/firmware.php/firmware.php/firmware.php
cve_nvd_summaryA vulnerability was found in eCharge Hardy Barth Salia PLCC 2.2.0. It has been declared as critical. This vulnerability affects unknown code of the file /firmware.php of the component Web UI. The manipulation of the argument media leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in eCharge Hardy Barth Salia PLCC 2.2.0. It has been declared as critical. This vulnerability affects unknown code of the file /firmware.php of the component Web UI. The manipulation of the argument media leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in eCharge Hardy Barth Salia PLCC 2.2.0. It has been declared as critical. This vulnerability affects unknown code of the file /firmware.php of the component Web UI. The manipulation of the argument media leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was detected in eCharge Hardy Barth Salia PLCC up to 2.3.81. Affected by this issue is some unknown functionality of the file /firmware.php of the component Web UI. Performing a manipulation of the argument media results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avNNNN
cvss4_cna_acLLLL
cvss4_cna_atNNNN
cvss4_cna_prLLLL
cvss4_cna_uiNNNN
cvss4_cna_vcLLLL
cvss4_cna_viLLLL
cvss4_cna_vaLLLL
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore5.35.35.35.3
cvss3_cna_avNNNN
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cLLLL
cvss3_cna_iLLLL
cvss3_cna_aLLLL
cvss3_cna_basescore6.36.36.36.3
cvss2_cna_avNNNN
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciPPPP
cvss2_cna_iiPPPP
cvss2_cna_aiPPPP
cvss2_cna_basescore6.56.56.56.5
euvd_idEUVD-2025-17455EUVD-2025-17455EUVD-2025-17455
cve_nvd_summaryesSe encontró una vulnerabilidad en eCharge Hardy Barth Salia PLCC 2.2.0. Se ha declarado crítica. Esta vulnerabilidad afecta al código desconocido del archivo /firmware.php del componente Web UI. La manipulación del argumento "media" permite la carga sin restricciones. El ataque puede iniciarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación sobre esta divulgación, pero no respondió.

Do you want to use VulDB in your project?

Use the official API to access entries easily!