Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Phoenix Contact | QUINT4-UPS/24DC/24DC/5/EIP | VC:00 ~ VC:07 | - | |
| Phoenix Contact | QUINT4-UPS/24DC/24DC/10/EIP | VC:00 ~ VC:07 | - | |
| Phoenix Contact | QUINT4-UPS/24DC/24DC/20/EIP | VC:00 ~ VC:07 | - | |
| Phoenix Contact | QUINT4-UPS/24DC/24DC/40/EIP | VC:00 ~ VC:07 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-41699 | 8.8 HIGH | Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers |
| CVE-2025-41705 | 6.8 MEDIUM | Phoenix Contact: WebSocket Message Interception Leaks Webfrontend Credentials |
| CVE-2025-41704 | 5.3 MEDIUM | Phoenix Contact: Unauthenticated Modbus Service DoS via Crafted Function Code |
| CVE-2025-41706 | 5.3 MEDIUM | Phoenix Contact: Webserver Denial of Service through Malformed Content-Length |
| CVE-2025-41707 | 5.3 MEDIUM | Phoenix Contact: WebSocket Handler Denial of Service |
No comments yet