CVE-2025-25270
08.07.2025, 07:15
An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.Enginsight
| Vendor | Product | Version |
|---|---|---|
| phoenixcontact | charx_sec-3000_firmware | 𝑥 < 1.7.3 |
| phoenixcontact | charx_sec-3050_firmware | 𝑥 < 1.7.3 |
| phoenixcontact | charx_sec-3100_firmware | 𝑥 < 1.7.3 |
| phoenixcontact | charx_sec-3150_firmware | 𝑥 < 1.7.3 |
𝑥
= Vulnerable software versions