2026 Futuriom 50: Highlights →Explore

Executive Summary

In April 2026, CISA disclosed two critical vulnerabilities in Hardy Barth's Salia EV Charge Controller firmware versions up to 2.3.81. Identified as CVE-2025-5873 and CVE-2025-10371, these flaws allow remote attackers to upload malicious files via the web interface, potentially leading to remote code execution. Despite public proof-of-concept exploits being available, Hardy Barth has not responded to coordination requests, leaving systems at risk.

This incident underscores the growing cybersecurity challenges in the EV infrastructure sector. The lack of vendor response highlights the need for proactive security measures and vigilant monitoring to protect critical energy and transportation systems from emerging threats.

Why This Matters Now

The vulnerabilities in Hardy Barth's Salia EV Charge Controllers expose critical infrastructure to potential remote attacks, emphasizing the urgent need for enhanced security protocols and vendor accountability in the rapidly expanding EV sector.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The vulnerabilities, CVE-2025-5873 and CVE-2025-10371, involve unrestricted file uploads via the web interface, potentially leading to remote code execution.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and controlled egress policies.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: The attacker's initial access may have been limited to the compromised device, reducing the potential for further exploitation.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: The attacker's ability to escalate privileges may have been constrained, limiting their control over the compromised device.

Lateral Movement

Control: East-West Traffic Security

Mitigation: The attacker's lateral movement could have been restricted, reducing the scope of the breach.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: The attacker's ability to establish command and control channels may have been detected and disrupted.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: The attacker's data exfiltration efforts could have been blocked, preventing sensitive information from leaving the network.

Impact (Mitigations)

The operational impact may have been minimized, preserving service availability.

Impact at a Glance

Affected Business Functions

  • EV Charging Operations
  • Billing Systems
  • Customer Data Management
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $50,000

Data Exposure

Potential exposure of customer PII and billing information.

Recommended Actions

  • Implement Zero Trust Segmentation to restrict lateral movement within the network.
  • Deploy Inline IPS (Suricata) to detect and prevent malicious file uploads.
  • Utilize Egress Security & Policy Enforcement to monitor and control outbound traffic.
  • Enhance Threat Detection & Anomaly Response capabilities to identify and respond to suspicious activities.
  • Regularly update and patch systems to mitigate known vulnerabilities.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image