Severity
8.8HIGH
EPSS
0.0%
top 85.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13

Description

An unauthenticated remote attacker can trick a high privileged user into uploading a malicious payload via the config-upload endpoint, leading to code injection as root. This results in a total loss of confidentiality, availability and integrity due to improper control of code generation ('Code Injection’).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages11 packages

CVEListV5phoenix_contact/tc_router_2002t-3g0.0.03.08.8
CVEListV5phoenix_contact/tc_router_2002t-4g0.0.03.08.8
CVEListV5phoenix_contact/tc_router_3002t-3g0.0.03.08.8
CVEListV5phoenix_contact/tc_router_3002t-4g0.0.03.08.8
CVEListV5phoenix_contact/tc_router_3002t-4g_gl0.0.03.08.8

🔴Vulnerability Details

2
CVEList
Config-Upload Code Injection2026-01-13
GHSA
GHSA-2448-826c-4v5m: An unauthenticated remote attacker can trick a high privileged user into uploading a malicious payload via the config-upload endpoint, leading to code2026-01-13

📋Vendor Advisories

1
Microsoft
Excessive memory growth in net/http and golang.org/x/net/http22022-12-13
CVE-2025-41717 (HIGH CVSS 8.8) | An unauthenticated remote attacker | cvebase.io