{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-5873","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-08T17:49:54.645Z","datePublished":"2025-06-09T10:31:04.727Z","dateUpdated":"2026-01-09T00:12:30.422Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-01-09T00:12:30.422Z"},"title":"eCharge Hardy Barth Salia PLCC Web UI firmware.php unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"Unrestricted Upload"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"eCharge Hardy Barth","product":"Salia PLCC","versions":[{"version":"2.3.0","status":"affected"},{"version":"2.3.1","status":"affected"},{"version":"2.3.2","status":"affected"},{"version":"2.3.3","status":"affected"},{"version":"2.3.4","status":"affected"},{"version":"2.3.5","status":"affected"},{"version":"2.3.6","status":"affected"},{"version":"2.3.7","status":"affected"},{"version":"2.3.8","status":"affected"},{"version":"2.3.9","status":"affected"},{"version":"2.3.10","status":"affected"},{"version":"2.3.11","status":"affected"},{"version":"2.3.12","status":"affected"},{"version":"2.3.13","status":"affected"},{"version":"2.3.14","status":"affected"},{"version":"2.3.15","status":"affected"},{"version":"2.3.16","status":"affected"},{"version":"2.3.17","status":"affected"},{"version":"2.3.18","status":"affected"},{"version":"2.3.19","status":"affected"},{"version":"2.3.20","status":"affected"},{"version":"2.3.21","status":"affected"},{"version":"2.3.22","status":"affected"},{"version":"2.3.23","status":"affected"},{"version":"2.3.24","status":"affected"},{"version":"2.3.25","status":"affected"},{"version":"2.3.26","status":"affected"},{"version":"2.3.27","status":"affected"},{"version":"2.3.28","status":"affected"},{"version":"2.3.29","status":"affected"},{"version":"2.3.30","status":"affected"},{"version":"2.3.31","status":"affected"},{"version":"2.3.32","status":"affected"},{"version":"2.3.33","status":"affected"},{"version":"2.3.34","status":"affected"},{"version":"2.3.35","status":"affected"},{"version":"2.3.36","status":"affected"},{"version":"2.3.37","status":"affected"},{"version":"2.3.38","status":"affected"},{"version":"2.3.39","status":"affected"},{"version":"2.3.40","status":"affected"},{"version":"2.3.41","status":"affected"},{"version":"2.3.42","status":"affected"},{"version":"2.3.43","status":"affected"},{"version":"2.3.44","status":"affected"},{"version":"2.3.45","status":"affected"},{"version":"2.3.46","status":"affected"},{"version":"2.3.47","status":"affected"},{"version":"2.3.48","status":"affected"},{"version":"2.3.49","status":"affected"},{"version":"2.3.50","status":"affected"},{"version":"2.3.51","status":"affected"},{"version":"2.3.52","status":"affected"},{"version":"2.3.53","status":"affected"},{"version":"2.3.54","status":"affected"},{"version":"2.3.55","status":"affected"},{"version":"2.3.56","status":"affected"},{"version":"2.3.57","status":"affected"},{"version":"2.3.58","status":"affected"},{"version":"2.3.59","status":"affected"},{"version":"2.3.60","status":"affected"},{"version":"2.3.61","status":"affected"},{"version":"2.3.62","status":"affected"},{"version":"2.3.63","status":"affected"},{"version":"2.3.64","status":"affected"},{"version":"2.3.65","status":"affected"},{"version":"2.3.66","status":"affected"},{"version":"2.3.67","status":"affected"},{"version":"2.3.68","status":"affected"},{"version":"2.3.69","status":"affected"},{"version":"2.3.70","status":"affected"},{"version":"2.3.71","status":"affected"},{"version":"2.3.72","status":"affected"},{"version":"2.3.73","status":"affected"},{"version":"2.3.74","status":"affected"},{"version":"2.3.75","status":"affected"},{"version":"2.3.76","status":"affected"},{"version":"2.3.77","status":"affected"},{"version":"2.3.78","status":"affected"},{"version":"2.3.79","status":"affected"},{"version":"2.3.80","status":"affected"},{"version":"2.3.81","status":"affected"}],"modules":["Web UI"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in eCharge Hardy Barth Salia PLCC up to 2.3.81. Affected by this issue is some unknown functionality of the file /firmware.php of the component Web UI. Performing a manipulation of the argument media results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-06-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-08T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-09T01:16:18.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"XU17 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.311632","name":"VDB-311632 | eCharge Hardy Barth Salia PLCC Web UI firmware.php unrestricted upload","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.311632","name":"VDB-311632 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.585733","name":"Submit #585733 | Salia PLCC Salia PLCC Slave  v2.2.0","tags":["third-party-advisory"]},{"url":"https://github.com/YZS17/CVE/blob/main/Salia_PLCC/Salia_PLCC_Slave_v2.2.0_File_Upload.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-09T17:47:53.089620Z","id":"CVE-2025-5873","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-09T17:48:02.495Z"}}]}}