An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.
| Software | From | Fixed in |
|---|---|---|
| phoenixcontact / charx_sec-3150_firmware | - | 1.6.3 |
| phoenixcontact / charx_sec-3100_firmware | - | 1.6.3 |
| phoenixcontact / charx_sec-3050_firmware | - | 1.6.3 |
| phoenixcontact / charx_sec-3000_firmware | - | 1.6.3 |