A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands.
References
Link | Resource |
---|---|
https://r.sec-consult.com/echarge |
Configurations
No configuration.
History
21 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.2 |
21 May 2025, 13:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-21 13:16
Updated : 2025-05-21 20:24
NVD link : CVE-2025-48415
Mitre link : CVE-2025-48415
CVE.ORG link : CVE-2025-48415
JSON object : View
Products Affected
No product.
CWE
CWE-749
Exposed Dangerous Method or Function