An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Charx_sec-3000_firmware | Phoenixcontact | * | 1.7.3 (excluding) |