9.8
CVE-2025-25270
- EPSS 0.27%
- Published 08.07.2025 07:00:58
- Last modified 11.07.2025 14:37:08
- Source info@cert.vde.com
- Teams watchlist Login
- Open Login
An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Phoenixcontact ≫ Charx Sec-3000 Firmware Version < 1.7.3
Phoenixcontact ≫ Charx Sec-3050 Firmware Version < 1.7.3
Phoenixcontact ≫ Charx Sec-3100 Firmware Version < 1.7.3
Phoenixcontact ≫ Charx Sec-3150 Firmware Version < 1.7.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.27% | 0.498 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
info@cert.vde.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-913 Improper Control of Dynamically-Managed Code Resources
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.