Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| PHOENIX CONTACT | CHARX SEC-3000 | 0 ~ 1.5.0 | - | |
| PHOENIX CONTACT | CHARX SEC-3050 | 0 ~ 1.5.0 | - | |
| PHOENIX CONTACT | CHARX SEC-3100 | 0 ~ 1.5.0 | - | |
| PHOENIX CONTACT | CHARX SEC-3150 | 0 ~ 1.5.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-25995 | 9.8 CRITICAL | PHOENIX CONTACT: Remote code execution in CHARX Series |
| CVE-2024-26288 | 8.7 HIGH | PHOENIX CONTACT: Lack of SSL support in CHARX Series |
| CVE-2024-25999 | 8.4 HIGH | PHOENIX CONTACT: Privilege escalation in the OCPP agent service |
| CVE-2024-26003 | 7.5 HIGH | PHOENIX CONTACT: DoS of the control agent in CHARX Series |
| CVE-2024-26004 | 7.5 HIGH | PHOENIX CONTACT: DoS of a control agent due to access of a uninitialized pointer in CHARX |
| CVE-2024-26001 | 7.4 HIGH | PHOENIX CONTACT: Out of bounds write only memory access |
| CVE-2024-25998 | 7.3 HIGH | PHOENIX CONTACT: Command injection in the OCPP Service |
| CVE-2024-26000 | 5.9 MEDIUM | PHOENIX CONTACT: Out of bounds read only memory access |
| CVE-2024-25994 | 5.3 MEDIUM | PHOENIX CONTACT: Unintended script file upload in CHARX Series |
| CVE-2024-25996 | 5.3 MEDIUM | PHOENIX CONTACT: Remote code execution due to an origin validation error in CHARX Series |
| CVE-2024-25997 | 5.3 MEDIUM | PHOENIX CONTACT: Log injection in CHARX Series |
| CVE-2024-26005 | 4.8 MEDIUM | PHOENIX CONTACT: Privilege gain through incomplete cleanup in CHARX Series |
No comments yet