An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
2025-07-08T07:15:25.080
2025-07-11T14:37:08.830
Analyzed
CVSSv3.1: 9.8 (CRITICAL)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | phoenixcontact | charx_sec-3000_firmware | < 1.7.3 | Yes |
Hardware | phoenixcontact | charx_sec-3000 | - | No |
Operating System | phoenixcontact | charx_sec-3050_firmware | < 1.7.3 | Yes |
Hardware | phoenixcontact | charx_sec-3050 | - | No |
Operating System | phoenixcontact | charx_sec-3100_firmware | < 1.7.3 | Yes |
Hardware | phoenixcontact | charx_sec-3100 | - | No |
Operating System | phoenixcontact | charx_sec-3150_firmware | < 1.7.3 | Yes |
Hardware | phoenixcontact | charx_sec-3150 | - | No |