CVE-2025-25270

9.8CRITICAL

An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.

公開日: 7/8/2025更新日: 7/11/2025

説明

An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.

AI分析AIによる分析

影響を受ける製品

phoenixcontactcharx_sec-3000_firmware
phoenixcontactcharx_sec-3000
-
phoenixcontactcharx_sec-3050_firmware
phoenixcontactcharx_sec-3050
-
phoenixcontactcharx_sec-3100_firmware
phoenixcontactcharx_sec-3100
-
phoenixcontactcharx_sec-3150_firmware
phoenixcontactcharx_sec-3150
-

参照