Phoenixcontact

Fl Switch 2206-2fx St

22 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 18.03.2026 07:35:09
  • Zuletzt bearbeitet 18.03.2026 14:52:44

A CSRF vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to trick authenticated users into sending unauthorized POST requests to the device by luring them to a malicious webpage. This can silently...

  • EPSS 0.08%
  • Veröffentlicht 18.03.2026 07:34:49
  • Zuletzt bearbeitet 18.03.2026 14:52:44

A stored cross‑site scripting (XSS) vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to create a trunk entry containing malicious HTML/JavaScript code. When the affected page is viewed, the injec...

  • EPSS 0.04%
  • Veröffentlicht 18.03.2026 07:34:36
  • Zuletzt bearbeitet 18.03.2026 14:52:44

A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occurs when a unauthenticated attacker send an oversized or unexpected username input. An overflow condition crashes the thread handling the login attempt, forcing the session...

  • EPSS 0.04%
  • Veröffentlicht 18.03.2026 07:34:23
  • Zuletzt bearbeitet 18.03.2026 14:52:44

A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling allows a low-privileged attacker with Telnet/SSH access to trigger memory corruption by supplying unexpected or oversized filename input. Exploitation results in the corru...

  • EPSS 0.04%
  • Veröffentlicht 18.03.2026 07:34:07
  • Zuletzt bearbeitet 18.03.2026 14:52:44

A stack-based buffer overflow in the device's file installation workflow allows a high-privileged attacker to send oversized POST parameters that overflow a fixed-size stack buffer within an internal process, resulting in a DoS attack.

  • EPSS 0.04%
  • Veröffentlicht 18.03.2026 07:33:55
  • Zuletzt bearbeitet 18.03.2026 14:52:44

A stack-based buffer overflow vulnerability in the device's file transfer parameter workflow allows a high-privileged attacker to send oversized POST parameters, causing memory corruption in an internal process, resulting in a DoS attack.

  • EPSS 0.06%
  • Veröffentlicht 18.03.2026 07:33:44
  • Zuletzt bearbeitet 18.03.2026 14:52:44

A command injection vulnerability in the device’s Root CA certificate transfer workflow allows a high-privileged attacker to send crafted HTTP POST requests that result in arbitrary command execution on the underlying Linux OS with root privileges.

  • EPSS 0.09%
  • Veröffentlicht 18.03.2026 07:33:31
  • Zuletzt bearbeitet 18.03.2026 14:52:44

A remote attacker with user privileges for the webUI can use the setting of the TFTP Filename with a POST Request to trigger a stack-based Buffer Overflow, resulting in a DoS attack.

  • EPSS 0.31%
  • Veröffentlicht 09.12.2025 08:13:47
  • Zuletzt bearbeitet 19.12.2025 18:11:57

A low privileged remote attacker can use the ssh feature to execute commands directly after login. The process stays open and uses resources which leads to a reduced performance of the management functions. Switching functionality is not affected.

  • EPSS 0.02%
  • Veröffentlicht 09.12.2025 08:13:22
  • Zuletzt bearbeitet 19.12.2025 18:12:06

An attacker can use an undocumented UART port on the PCB as a side-channel with the user hardcoded credentials obtained from CVE-2025-41692 to gain read access to parts of the filesystem of the device.