OpenSSH Daemon Vulnerability in Firmware for Root User Access
CVE-2025-48416

8.1HIGH

Key Information:

Vendor
CVE Published:
21 May 2025

What is CVE-2025-48416?

The OpenSSH daemon is found to have a serious configuration issue where a hard-coded entry for the root user is present in the '/etc/shadow' file of its firmware image. Despite the default SSH settings disabling root login, this safeguard may be circumvented by an attacker, highlighting a significant loophole in the security measures provided. This flaw necessitates immediate attention to prevent unauthorized access and bolster system security.

Affected Version(s)

cPH2 / cPP2 charging stations <=2.2.0

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Stefan Viehböck | SEC Consult Vulnerability Lab
.