Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Phoenix Contact | CHARX SEC-3150 | 0.0.0 ~ 1.7.3 | - | |
| Phoenix Contact | CHARX SEC-3100 | 0.0.0 ~ 1.7.3 | - | |
| Phoenix Contact | CHARX SEC-3050 | 0.0.0 ~ 1.7.3 | - | |
| Phoenix Contact | CHARX SEC-3000 | 0.0.0 ~ 1.7.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-25270 | 9.8 CRITICAL | Remote Code Execution via Unauthenticated Configuration Manipulation |
| CVE-2025-41666 | 8.8 HIGH | Phoenix Contact: File access due to the replacement of a critical file used by the watchdo |
| CVE-2025-41667 | 8.8 HIGH | Phoenix Contact: File access due to the replacement of a critical file used by the arp-pre |
| CVE-2025-41668 | 8.8 HIGH | Phoenix Contact: File access due to the replacement of a critical file used by the service |
| CVE-2025-25271 | 8.8 HIGH | OCPP Backend Configuration via Insecure Defaults |
| CVE-2025-25269 | 8.4 HIGH | Local Privilege Escalation via Unauthenticated Command Injection |
| CVE-2025-24003 | 8.2 HIGH | MQTT OOB Write Vulnerability in EichrechtAgents of German EV Charging Stations |
| CVE-2025-24005 | 7.8 HIGH | Local Privilege Escalation via Vulnerable SSH Script |
| CVE-2025-24006 | 7.8 HIGH | Privilege Escalation via Insecure SSH Permissions |
| CVE-2025-41665 | 6.5 MEDIUM | Phoenix Contact: DoS of the PLC due to incorrect default permissions possible |
| CVE-2025-24002 | 5.3 MEDIUM | MQTT DoS Vulnerability in German EV Charging Stations |
| CVE-2025-24004 | 5.2 MEDIUM | USB-C Buffer Overflow via Display Interface in EV Charging Stations |
No comments yet