An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
References
Link | Resource |
---|---|
https://certvde.com/de/advisories/VDE-2025-019 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
11 Jul 2025, 14:37
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-08 07:15
Updated : 2025-07-11 14:37
NVD link : CVE-2025-25270
Mitre link : CVE-2025-25270
CVE.ORG link : CVE-2025-25270
JSON object : View
Products Affected
phoenixcontact
- charx_sec-3000
- charx_sec-3150
- charx_sec-3150_firmware
- charx_sec-3050
- charx_sec-3100_firmware
- charx_sec-3000_firmware
- charx_sec-3050_firmware
- charx_sec-3100
CWE
CWE-913
Improper Control of Dynamically-Managed Code Resources