- Description
- An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
- Source
- info@cert.vde.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- info@cert.vde.com
- CWE-913
- Hype score
- Not currently trending
CVE-2025-25270 An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations. https://t.co/rVcpm2ye5R
@CVEnew
8 Jul 2025
188 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-25270: CRITICAL] An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.#cve,CVE-2025-25270,#cybersecurity https://t.co/FEznt0Sg3Z https://t.co/g2gJS1alww
@CveFindCom
8 Jul 2025
68 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9E2E15E9-975A-4B26-8AAD-2621754930CF",
"versionEndExcluding": "1.7.3"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:charx_sec-3000:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "D1095269-9D5A-4557-BA9D-33B49AAA339F"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "63AD1F59-F9B7-4914-BF4C-9EC63AAA61E4",
"versionEndExcluding": "1.7.3"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:charx_sec-3050:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "775BA5ED-968B-4759-BA39-50F9EAB29169"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "43A018ED-A75E-4DF9-A73F-61E473FB2862",
"versionEndExcluding": "1.7.3"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:charx_sec-3100:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F498BFB3-3C39-4F0B-9775-0B4F891D866C"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "546AB06F-3924-44DC-B9F1-E70137A4F253",
"versionEndExcluding": "1.7.3"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:charx_sec-3150:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "32916BED-0241-4787-960C-7A4E8E1DDED7"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]