An low privileged remote attacker with an account for the Web-based management can change the system configuration to perform a command injection as root, resulting in a total loss of confidentiality, availability and integrity due to improper control of generation of code ('Code Injection').
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 14 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description An low privileged remote attacker with an account for the Web-based management can change the system configuration to perform a command injection as root, resulting in a total loss of confidentiality, availability and integrity due to improper control of generation of code ('Code Injection').
Title Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-10-14T18:43:41.706Z

Reserved: 2025-04-16T11:17:48.310Z

Link: CVE-2025-41699

cve-icon Vulnrichment

Updated: 2025-10-14T18:43:38.600Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-14T09:15:32.830

Modified: 2025-10-14T19:36:29.240

Link: CVE-2025-41699

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.