A low privileged remote attacker can use a command injection vulnerability in the API which performs remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected.
| Software | From | Fixed in |
|---|---|---|
| phoenixcontact / charx_sec-3000_firmware | - | 1.5.1.x |
| phoenixcontact / charx_sec-3050_firmware | - | 1.5.1.x |
| phoenixcontact / charx_sec-3100_firmware | - | 1.5.1.x |
| phoenixcontact / charx_sec-3150_firmware | - | 1.5.1.x |