CVE-2025-41666Link Following in Contact AXC F 1152

CWE-59Link Following3 documents3 sources
Severity
8.8HIGHNVD
EPSS
0.4%
top 36.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 8

Description

A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watchdog has been initialized.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5phoenix_contact/bpc_9102s< 2025.0.2
CVEListV5phoenix_contact/rfc_4072s< 2025.0.2
CVEListV5phoenix_contact/axc_f_1152< 2025.0.2
CVEListV5phoenix_contact/axc_f_2152< 2025.0.2
CVEListV5phoenix_contact/axc_f_3152< 2025.0.2

🔴Vulnerability Details

2
CVEList
Phoenix Contact: File access due to the replacement of a critical file used by the watchdog2025-07-08
GHSA
GHSA-6hjq-rgp4-842x: A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file o2025-07-08
CVE-2025-41666 — Link Following in Contact AXC F 1152 | cvebase