Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 21 Oct 2025 01:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phoenixcontact
Phoenixcontact charx Sec-3000 Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3150 |
|
| Vendors & Products |
Phoenixcontact
Phoenixcontact charx Sec-3000 Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3150 |
Wed, 15 Oct 2025 04:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Oct 2025 17:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An low privileged remote attacker with an account for the Web-based management can change the system configuration to perform a command injection as root, resulting in a total loss of confidentiality, availability and integrity due to improper control of generation of code ('Code Injection'). | |
| Title | Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-10-15T06:36:45.974Z
Reserved: 2025-04-16T11:17:48.310Z
Link: CVE-2025-41699
Updated: 2025-10-14T18:43:38.600Z
Status : Awaiting Analysis
Published: 2025-10-14T09:15:32.830
Modified: 2025-10-14T19:36:29.240
Link: CVE-2025-41699
No data.
OpenCVE Enrichment
Updated: 2025-10-21T00:52:39Z