CVE-2025-25268
08.07.2025, 07:15
An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.Enginsight
Vendor | Product | Version |
---|---|---|
phoenixcontact | charx_sec-3000_firmware | 𝑥 < 1.7.3 |
phoenixcontact | charx_sec-3050_firmware | 𝑥 < 1.7.3 |
phoenixcontact | charx_sec-3100_firmware | 𝑥 < 1.7.3 |
phoenixcontact | charx_sec-3150_firmware | 𝑥 < 1.7.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration