CVE-2025-25270
9.8CRITICALAn unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
게시됨: 7/8/2025업데이트됨: 7/11/2025
설명
An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
AI 분석AI 기반
영향받는 제품
phoenixcontactcharx_sec-3000_firmware
phoenixcontactcharx_sec-3000
-
phoenixcontactcharx_sec-3050_firmware
phoenixcontactcharx_sec-3050
-
phoenixcontactcharx_sec-3100_firmware
phoenixcontactcharx_sec-3100
-
phoenixcontactcharx_sec-3150_firmware
phoenixcontactcharx_sec-3150
-
참조
- https://certvde.com/de/advisories/VDE-2025-019Third Party Advisory