An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation.
2024-03-12T09:15:07.343
2025-01-30T11:15:11.290
Modified
CVSSv3.1: 9.8 (CRITICAL)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | phoenixcontact | charx_sec-3000_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3000 | - | No |
| Operating System | phoenixcontact | charx_sec-3050_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3050 | - | No |
| Operating System | phoenixcontact | charx_sec-3100_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3100 | - | No |
| Operating System | phoenixcontact | charx_sec-3150_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3150 | - | No |