CVE-2025-41717: CWE-94 Improper Control of Generation of Code ('Code Injection') in Phoenix Contact TC ROUTER 3002T-3G
CVE-2025-41717 is a high-severity code injection vulnerability in the Phoenix Contact TC ROUTER 3002T-3G. An unauthenticated remote attacker can trick a privileged user into uploading a malicious payload via the config-upload endpoint, resulting in root-level code execution. This leads to a complete loss of confidentiality, integrity, and availability of the affected device. Exploitation requires user interaction but no authentication, making it highly dangerous in operational environments. The vulnerability stems from improper control of code generation (CWE-94). No known exploits are currently in the wild, and no patches have been released yet. European organizations using these routers in critical infrastructure or industrial networks are at significant risk. Mitigation requires strict operational controls around configuration uploads and network segmentation until a vendor patch is available.
AI Analysis
Technical Summary
CVE-2025-41717 is a critical vulnerability identified in the Phoenix Contact TC ROUTER 3002T-3G, a device commonly used in industrial and critical infrastructure networks for secure communications. The vulnerability is classified under CWE-94, indicating improper control over code generation, specifically code injection. The flaw exists in the router's config-upload endpoint, which allows an unauthenticated remote attacker to trick a high-privileged user into uploading a malicious configuration payload. This payload, when processed by the device, leads to arbitrary code execution with root privileges. The attack vector requires no authentication (AV:N), has low complexity (AC:L), and does not require privileges (PR:N), but does require user interaction (UI:R), such as convincing an authorized user to upload the malicious config. The impact is severe, causing total compromise of confidentiality, integrity, and availability of the device and potentially the network it protects. The vulnerability is particularly dangerous because it allows remote exploitation without prior access credentials, enabling attackers to gain full control over the router. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. Given the router's role in industrial control systems and critical infrastructure, exploitation could lead to significant operational disruptions and data breaches.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy, utilities, and transportation, this vulnerability poses a critical risk. The TC ROUTER 3002T-3G is often deployed in environments requiring secure and reliable communications, including SCADA and ICS networks. Exploitation could allow attackers to disrupt operational technology systems, cause downtime, manipulate sensitive data, or pivot to other internal systems, leading to widespread operational and financial damage. The total loss of confidentiality, integrity, and availability could result in safety incidents, regulatory non-compliance, and reputational harm. Given the high connectivity of European critical infrastructure and the increasing targeting by sophisticated threat actors, this vulnerability could be leveraged in targeted attacks or ransomware campaigns. The requirement for user interaction means social engineering or phishing could be used to facilitate exploitation, increasing the attack surface. The absence of patches further exacerbates the risk, necessitating immediate compensating controls.
Mitigation Recommendations
Until an official patch is released by Phoenix Contact, European organizations should implement strict operational controls to mitigate this vulnerability. These include: 1) Restricting access to the config-upload endpoint via network segmentation and firewall rules, limiting it only to trusted management networks and users. 2) Implementing strict user training and awareness programs to prevent social engineering attacks that could trick privileged users into uploading malicious configurations. 3) Monitoring and logging all configuration upload activities to detect suspicious or unauthorized attempts. 4) Employing multi-factor authentication and role-based access controls for all management interfaces to reduce the risk of unauthorized access. 5) Using network intrusion detection/prevention systems (IDS/IPS) to identify anomalous traffic patterns related to config uploads. 6) Isolating critical routers from general enterprise networks to minimize exposure. 7) Preparing incident response plans specifically addressing potential exploitation scenarios. Organizations should also maintain close communication with Phoenix Contact for timely patch releases and apply updates immediately upon availability.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Belgium, Poland, Sweden
CVE-2025-41717: CWE-94 Improper Control of Generation of Code ('Code Injection') in Phoenix Contact TC ROUTER 3002T-3G
Description
CVE-2025-41717 is a high-severity code injection vulnerability in the Phoenix Contact TC ROUTER 3002T-3G. An unauthenticated remote attacker can trick a privileged user into uploading a malicious payload via the config-upload endpoint, resulting in root-level code execution. This leads to a complete loss of confidentiality, integrity, and availability of the affected device. Exploitation requires user interaction but no authentication, making it highly dangerous in operational environments. The vulnerability stems from improper control of code generation (CWE-94). No known exploits are currently in the wild, and no patches have been released yet. European organizations using these routers in critical infrastructure or industrial networks are at significant risk. Mitigation requires strict operational controls around configuration uploads and network segmentation until a vendor patch is available.
AI-Powered Analysis
Technical Analysis
CVE-2025-41717 is a critical vulnerability identified in the Phoenix Contact TC ROUTER 3002T-3G, a device commonly used in industrial and critical infrastructure networks for secure communications. The vulnerability is classified under CWE-94, indicating improper control over code generation, specifically code injection. The flaw exists in the router's config-upload endpoint, which allows an unauthenticated remote attacker to trick a high-privileged user into uploading a malicious configuration payload. This payload, when processed by the device, leads to arbitrary code execution with root privileges. The attack vector requires no authentication (AV:N), has low complexity (AC:L), and does not require privileges (PR:N), but does require user interaction (UI:R), such as convincing an authorized user to upload the malicious config. The impact is severe, causing total compromise of confidentiality, integrity, and availability of the device and potentially the network it protects. The vulnerability is particularly dangerous because it allows remote exploitation without prior access credentials, enabling attackers to gain full control over the router. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. Given the router's role in industrial control systems and critical infrastructure, exploitation could lead to significant operational disruptions and data breaches.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy, utilities, and transportation, this vulnerability poses a critical risk. The TC ROUTER 3002T-3G is often deployed in environments requiring secure and reliable communications, including SCADA and ICS networks. Exploitation could allow attackers to disrupt operational technology systems, cause downtime, manipulate sensitive data, or pivot to other internal systems, leading to widespread operational and financial damage. The total loss of confidentiality, integrity, and availability could result in safety incidents, regulatory non-compliance, and reputational harm. Given the high connectivity of European critical infrastructure and the increasing targeting by sophisticated threat actors, this vulnerability could be leveraged in targeted attacks or ransomware campaigns. The requirement for user interaction means social engineering or phishing could be used to facilitate exploitation, increasing the attack surface. The absence of patches further exacerbates the risk, necessitating immediate compensating controls.
Mitigation Recommendations
Until an official patch is released by Phoenix Contact, European organizations should implement strict operational controls to mitigate this vulnerability. These include: 1) Restricting access to the config-upload endpoint via network segmentation and firewall rules, limiting it only to trusted management networks and users. 2) Implementing strict user training and awareness programs to prevent social engineering attacks that could trick privileged users into uploading malicious configurations. 3) Monitoring and logging all configuration upload activities to detect suspicious or unauthorized attempts. 4) Employing multi-factor authentication and role-based access controls for all management interfaces to reduce the risk of unauthorized access. 5) Using network intrusion detection/prevention systems (IDS/IPS) to identify anomalous traffic patterns related to config uploads. 6) Isolating critical routers from general enterprise networks to minimize exposure. 7) Preparing incident response plans specifically addressing potential exploitation scenarios. Organizations should also maintain close communication with Phoenix Contact for timely patch releases and apply updates immediately upon availability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:17:48.313Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6965faafa60475309f41c759
Added to database: 1/13/2026, 7:56:31 AM
Last enriched: 1/13/2026, 8:11:00 AM
Last updated: 1/13/2026, 10:31:56 AM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-49775: CWE-122: Heap-based Buffer Overflow in Siemens Opcenter Execution Foundation
CriticalCVE-2025-40944: CWE-400: Uncontrolled Resource Consumption in Siemens SIMATIC ET 200AL IM 157-1 PN
HighCVE-2025-40942: CWE-250: Execution with Unnecessary Privileges in Siemens TeleControl Server Basic
HighCVE-2025-40805: CWE-639: Authorization Bypass Through User-Controlled Key in Siemens Industrial Edge Cloud Device (IECD)
CriticalCVE-2025-14829: CWE-862 Missing Authorization in E-xact | Hosted Payment |
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.