Phoenix Contact Charx Sec-3050 vulnerabilities
30 known vulnerabilities affecting phoenix_contact/charx_sec-3050.
Total CVEs
30
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL5HIGH19MEDIUM6
Vulnerabilities
Page 1 of 2
CVE-2025-41699HIGHCVSS 8.8≥ 0.0.0, < 1.7.42025-10-14
CVE-2025-41699 [HIGH] CWE-94 CVE-2025-41699: An low privileged remote attacker with an account for the Web-based management can change the system
An low privileged remote attacker with an account for the Web-based management can change the system configuration to perform a command injection as root, resulting in a total loss of confidentiality, availability and integrity due to improper control of generation of code ('Code Injection').
cvelistv5nvd
CVE-2025-25270CRITICALCVSS 9.8≥ 0.0.0, < 1.7.32025-07-08
CVE-2025-25270 [CRITICAL] CWE-913 CVE-2025-25270: An unauthenticated remote attacker can alter the device configuration in a way to get remote code ex
An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
cvelistv5nvd
CVE-2025-24003HIGHCVSS 8.2≥ 0.0.0, ≤ 1.6.52025-07-08
CVE-2025-24003 [HIGH] CWE-120 CVE-2025-24003: An unauthenticated remote attacker can use MQTT messages to trigger out-of-bounds writes in charging
An unauthenticated remote attacker can use MQTT messages to trigger out-of-bounds writes in charging stations complying with German Calibration Law, resulting in a loss of integrity for only EichrechtAgents and potential denial-of-service for these stations.
cvelistv5nvd
CVE-2025-25271HIGHCVSS 8.8≥ 0.0.0, < 1.7.32025-07-08
CVE-2025-25271 [HIGH] CWE-1188 CVE-2025-25271: An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaul
An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface.
cvelistv5nvd
CVE-2025-25268HIGHCVSS 8.8≥ 0.0.0, < 1.7.32025-07-08
CVE-2025-25268 [HIGH] CWE-306 CVE-2025-25268: An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API
An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.
cvelistv5nvd
CVE-2025-24005HIGHCVSS 7.8≥ 0.0.0, < 1.7.32025-07-08
CVE-2025-24005 [HIGH] CWE-20 CVE-2025-24005: A local attacker with a local user account can leverage a vulnerable script via SSH to escalate priv
A local attacker with a local user account can leverage a vulnerable script via SSH to escalate privileges to root due to improper input validation.
cvelistv5nvd
CVE-2025-25269HIGHCVSS 8.4≥ 0.0.0, < 1.7.32025-07-08
CVE-2025-25269 [HIGH] CWE-78 CVE-2025-25269: An unauthenticated local attacker can inject a command that is subsequently executed as root, leadin
An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation.
cvelistv5nvd
CVE-2025-24006HIGHCVSS 7.8≥ 0.0.0, < 1.7.32025-07-08
CVE-2025-24006 [HIGH] CWE-269 CVE-2025-24006: A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to
A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.
cvelistv5nvd
CVE-2025-24002MEDIUMCVSS 5.3≥ 0.0.0, ≤ 1.6.52025-07-08
CVE-2025-24002 [MEDIUM] CWE-20 CVE-2025-24002: An unauthenticated remote attacker can use MQTT messages to crash a service on charging stations com
An unauthenticated remote attacker can use MQTT messages to crash a service on charging stations complying with German Calibration Law, resulting in a temporary denial-of-service for these stations until they got restarted by the watchdog.
cvelistv5nvd
CVE-2025-24004MEDIUMCVSS 5.2≥ 0.0.0, ≤ 1.6.52025-07-08
CVE-2025-24004 [MEDIUM] CWE-120 CVE-2025-24004: A physical attacker with access to the device display via USB-C can send a message to the device whi
A physical attacker with access to the device display via USB-C can send a message to the device which triggers an unsecure copy to a buffer resulting in loss of integrity and a temporary denial-of-service for the stations until they got restarted by the watchdog.
cvelistv5nvd
CVE-2024-11497HIGHCVSS 8.8fixed in 1.7.02025-01-14
CVE-2024-11497 [HIGH] CWE-732 CVE-2024-11497: An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root
An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access.
cvelistv5nvd
CVE-2024-6788CRITICALCVSS 9.8fixed in 1.6.32024-08-13
CVE-2024-6788 [HIGH] CWE-1392 CVE-2024-6788: A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the de
A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
cvelistv5nvd
CVE-2024-28134HIGHCVSS 7.0≤ 1.5.12024-05-14
CVE-2024-28134 [HIGH] CWE-319 CVE-2024-28134:
An unauthenticated remote attacker ca
An unauthenticated remote attacker can extract a session token with a MitM attack and gain web-based
management access with the privileges of the currently logged in user due to cleartext transmission of sensitive information. No additional user interaction is required. The access is limited as only non-sensitive information can be obtained but the av
cvelistv5nvd
CVE-2024-28137HIGHCVSS 7.8≤ 1.5.12024-05-14
CVE-2024-28137 [HIGH] CWE-367 CVE-2024-28137:
A local attacker with low privileges
A local attacker with low privileges can perform a privilege escalation with an init script due to a TOCTOU vulnerability.
cvelistv5nvd
CVE-2024-28136HIGHCVSS 7.8≤ 1.5.12024-05-14
CVE-2024-28136 [HIGH] CWE-77 CVE-2024-28136: A local attacker with low privileges can use a command injection vulnerability to gain root
privileg
A local attacker with low privileges can use a command injection vulnerability to gain root
privileges due to improper input validation using the OCPP Remote service.
cvelistv5nvd
CVE-2024-28133HIGHCVSS 7.8≤ 1.5.12024-05-14
CVE-2024-28133 [HIGH] CWE-426 CVE-2024-28133:
A local low privileged attacker can use an untrusted search path in a
A local low privileged attacker can use an untrusted search path in a CHARX system utility to gain root
privileges.
cvelistv5nvd
CVE-2024-28135MEDIUMCVSS 5.0≤ 1.5.12024-05-14
CVE-2024-28135 [MEDIUM] CWE-77 CVE-2024-28135: A low privileged remote attacker can use a command injection vulnerability in the API which performs
A low privileged remote attacker can use a command injection vulnerability in the API which performs
remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected.
cvelistv5nvd
CVE-2024-25996CRITICALCVSS 9.8≤ 1.5.02024-03-12
CVE-2024-25996 [MEDIUM] CWE-346 CVE-2024-25996: An unauthenticated remote attacker can perform a remote code execution due to an origin validation e
An unauthenticated remote attacker can perform a remote code execution due to an origin validation error. The access is limited to the service user.
cvelistv5nvd
CVE-2024-25995CRITICALCVSS 9.8≤ 1.5.02024-03-12
CVE-2024-25995 [CRITICAL] CWE-20 CVE-2024-25995: An unauthenticated remote attacker can modify configurations to perform a remote code execution, gai
An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation.
cvelistv5nvd
CVE-2024-26001CRITICALCVSS 9.8≤ 1.5.02024-03-12
CVE-2024-26001 [HIGH] CWE-787 CVE-2024-26001: An unauthenticated remote attacker can write memory out of bounds due to improper input validation i
An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.
cvelistv5nvd
1 / 2Next →