8.8
CVE-2025-41699
- EPSS 0.28%
- Veröffentlicht 14.10.2025 08:35:05
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle info@cert.vde.com
- CVE-Watchlists
- Unerledigt
Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers
An low privileged remote attacker with an account for the Web-based management can change the system configuration to perform a command injection as root, resulting in a total loss of confidentiality, availability and integrity due to improper control of generation of code ('Code Injection').Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerPhoenix Contact
≫
Produkt
CHARX SEC-3150
Default Statusunaffected
Version
0.0.0
Version <
1.7.4
Status
affected
HerstellerPhoenix Contact
≫
Produkt
CHARX SEC-3100
Default Statusunaffected
Version
0.0.0
Version <
1.7.4
Status
affected
HerstellerPhoenix Contact
≫
Produkt
CHARX SEC-3050
Default Statusunaffected
Version
0.0.0
Version <
1.7.4
Status
affected
HerstellerPhoenix Contact
≫
Produkt
CHARX SEC-3000
Default Statusunaffected
Version
0.0.0
Version <
1.7.4
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.28% | 0.514 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| info@cert.vde.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.