API Configuration Vulnerability in Affected Product by Vendor
CVE-2025-25268
8.8HIGH
What is CVE-2025-25268?
An unauthenticated adjacent attacker can exploit this vulnerability by sending crafted requests to a specific API endpoint. This exploitation results in unauthorized read and write access due to the absence of proper authentication measures, allowing attackers to modify critical configuration settings within the affected product.
Affected Version(s)
CHARX SEC-3000 0.0.0 < 1.7.3
CHARX SEC-3050 0.0.0 < 1.7.3
CHARX SEC-3100 0.0.0 < 1.7.3