The `/etc/passwd` and `/etc/shadow` files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell).
References
Link | Resource |
---|---|
https://r.sec-consult.com/echarge |
Configurations
No configuration.
History
21 May 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.7 |
21 May 2025, 12:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-21 12:16
Updated : 2025-05-21 20:24
NVD link : CVE-2025-48413
Mitre link : CVE-2025-48413
CVE.ORG link : CVE-2025-48413
JSON object : View
Products Affected
No product.
CWE
CWE-798
Use of Hard-coded Credentials