8.8
CVE-2025-41667 - Phoenix Contact: File access due to the replacement of a critical file used by the arp-preinit scriβ¦
A low privileged remote attacker with file access can replace a critical file used by the arp-preinit script to get read, write and execute access to any file on the device.
8.8
CVE-2025-41666 - Phoenix Contact: File access due to the replacement of a critical file used by the watchdog
A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watchdog has been initialized.
6.5
CVE-2025-41665 - Phoenix Contact: DoS of the PLC due to incorrect default permissions possible
An low privileged remote attacker can enforce the watchdog of the affected devices to reboot the PLC due to incorrect default permissions of a config file.
5.3
CVE-2025-7167 - code-projects Responsive Blog Site category.php sql injection
A vulnerability was found in code-projects Responsive Blog Site 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /category.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed β¦
8.8
CVE-2025-25271 - OCPP Backend Configuration via Insecure Defaults
An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface.
9.8
CVE-2025-25270 - Remote Code Execution via Unauthenticated Configuration Manipulation
An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
8.4
CVE-2025-25269 - Local Privilege Escalation via Unauthenticated Command Injection
An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation.
8.8
CVE-2025-25268 - Unauthenticated Configuration Access via Exposed API Endpoint
An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.
7.8
CVE-2025-24006 - Privilege Escalation via Insecure SSH Permissions
A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.
7.8
CVE-2025-24005 - Local Privilege Escalation via Vulnerable SSH Script
A local attacker with a local user account can leverage a vulnerable script via SSH to escalate privileges to root due to improper input validation.