phoenix contact Charx Sec 3150 Vulnerabilities
Phoenix%20contact Charx Sec-3150 vulnerabilities.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
Insecure Configuration Interface in OCPP Backend by a Leading Vendor
CVE-2025-25271Phoenix ContactCharx Sec-31508.8HIGHRemote Code Execution Vulnerability in Affected Device Configuration by Vendor
CVE-2025-25270Phoenix ContactCharx Sec-31509.8CRITICALPrivilege Escalation Vulnerability in Vendor Product
CVE-2025-25269Phoenix ContactCharx Sec-31508.4HIGHAPI Configuration Vulnerability in Affected Product by Vendor
CVE-2025-25268Phoenix ContactCharx Sec-31508.8HIGHLocal Privilege Escalation Vulnerability in Affected Devices by CERT-VDE
CVE-2025-24006Phoenix ContactCharx Sec-31507.8HIGHLocal Privilege Escalation Vulnerability in Affected Product by Vendor
CVE-2025-24005Phoenix ContactCharx Sec-31507.8HIGHBuffer Copy Vulnerability in USB-C Devices by Vendor A
CVE-2025-24004Phoenix ContactCharx Sec-31505.2MEDIUMOut-of-Bounds Write Vulnerability in Charging Stations by VDE
CVE-2025-24003Phoenix ContactCharx Sec-31508.2HIGHRemote Denial-of-Service Vulnerability in Charging Stations Complying with German Calibration Law
CVE-2025-24002Phoenix ContactCharx Sec-31505.3MEDIUMDefault Password Vulnerability in LAN Interface Could Allow Remote Reset of User Account
CVE-2024-6788Phoenix ContactCharx Sec-30009.8CRITICALUnauthenticated Attacker Can Modify Device Configuration via File Write
CVE-2024-3913Phoenix ContactCharx Sec-3000 (1139022)5.9MEDIUMPrivilege Escalation Vulnerability in Initi Script
CVE-2024-28137Phoenix ContactCharx Sec-30007.8HIGHCommand Injection Vulnerability Can Lead to Root Privileges
CVE-2024-28136Phoenix ContactCharx Sec-30007.8HIGHLow Privileged Remote Attacker Can Execute Code as User-App User Due to Input Validation Flaw
CVE-2024-28135Phoenix ContactCharx Sec-30005MEDIUMUnauthenticated Remote Attackers Can Extract Session Token and Gain Web-Based Management Access
CVE-2024-28134Phoenix ContactCharx Sec-30007HIGHLocal Low Privileged Attacker Can Use Untrusted Search Path to Gain Root Privileges
CVE-2024-28133Phoenix ContactCharx Sec-30007.8HIGHUnencrypted Data Vulnerable to Interception
CVE-2024-26288Phoenix ContactCharx Sec-30008.7HIGHUnauthenticated Remote Attackers Can Gain Service Level Privileges Through Incomplete Cleanup During Service Restart After DoS
CVE-2024-26005Phoenix ContactCharx Sec-30004.8MEDIUMUninitialized Pointer DoS Attack Affects Control Agent
CVE-2024-26004Phoenix ContactCharx Sec-30007.5HIGHUnauthenticated Remote Attack Can Cause Denial of Service (DoS) Against Charging Functionality
CVE-2024-26003Phoenix ContactCharx Sec-30007.5HIGHQualcomm plctool Vulnerability Allows Local Attacker with Low Privileges to Gain Root Access
CVE-2024-26002Phoenix ContactCharx Sec-30007.8HIGHUnauthenticated Remote Attackers Can Write Memory Out of Bounds Due to Input Validation Flaw in MQTT Stack
CVE-2024-26001Phoenix ContactCharx Sec-30009.8CRITICALUnauthenticated Remote Attacker Can Read Memory Out of Bounds Due to Input Validation Flaw in MQTT Stack
CVE-2024-26000Phoenix ContactCharx Sec-30005.9MEDIUMPrivilege Escalation Vulnerability in OCPP Agent Service
CVE-2024-25999Phoenix ContactCharx Sec-30007.8HIGHUnauthenticated Remote Attackers Can Perform Command Injection with Limited Privileges
CVE-2024-25998Phoenix ContactCharx Sec-30007.3HIGH