A local attacker with a local user account can leverage a vulnerable script via SSH to escalate privileges to root due to improper input validation.
2025-07-08T07:15:24.303
2025-07-11T14:36:07.343
Analyzed
CVSSv3.1: 7.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | phoenixcontact | charx_sec-3000_firmware | < 1.7.3 | Yes |
Hardware | phoenixcontact | charx_sec-3000 | - | No |
Operating System | phoenixcontact | charx_sec-3050_firmware | < 1.7.3 | Yes |
Hardware | phoenixcontact | charx_sec-3050 | - | No |
Operating System | phoenixcontact | charx_sec-3100_firmware | < 1.7.3 | Yes |
Hardware | phoenixcontact | charx_sec-3100 | - | No |
Operating System | phoenixcontact | charx_sec-3150_firmware | < 1.7.3 | Yes |
Hardware | phoenixcontact | charx_sec-3150 | - | No |