Description

An unauthenticated remote attacker can trick a high privileged user into uploading a malicious payload via the config-upload endpoint, leading to code injection as root. This results in a total loss of confidentiality, availability and integrity due to improper control of code generation ('Code Injection’).

INFO

Published Date :

2026-01-13T07:48:19.811Z

Last Modified :

2026-02-05T06:19:46.032Z

Source :

CERTVDE
AFFECTED PRODUCTS

The following products are affected by CVE-2025-41717 vulnerability.

Vendors Products
Phoenixcontact
  • Cloud Client 1101t-tx
  • Tc Cloud Client 1002-4g Att
  • Tc Cloud Client 1002-txtx
  • Tc Router 2002t-3g
  • Tc Router 3002t-4g
  • Tc Router 3002t-4g Att
  • Tc Router 3002t-4g Vzw
  • Tc Router 5004t-5g Eu
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-41717.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact