Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41717: CWE-94 Improper Control of Generation of Code ('Code Injection') in Phoenix Contact TC ROUTER 3002T-3G

0
High
VulnerabilityCVE-2025-41717cvecve-2025-41717cwe-94
Published: Tue Jan 13 2026 (01/13/2026, 07:48:19 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: TC ROUTER 3002T-3G

Description

CVE-2025-41717 is a high-severity code injection vulnerability in the Phoenix Contact TC ROUTER 3002T-3G. An unauthenticated remote attacker can trick a privileged user into uploading a malicious payload via the config-upload endpoint, resulting in root-level code execution. This leads to a complete loss of confidentiality, integrity, and availability of the affected device. Exploitation requires user interaction but no authentication, making it highly dangerous in operational environments. The vulnerability stems from improper control of code generation (CWE-94). No known exploits are currently in the wild, and no patches have been released yet. European organizations using these routers in critical infrastructure or industrial networks are at significant risk. Mitigation requires strict operational controls around configuration uploads and network segmentation until a vendor patch is available.

AI-Powered Analysis

AILast updated: 01/13/2026, 08:11:00 UTC

Technical Analysis

CVE-2025-41717 is a critical vulnerability identified in the Phoenix Contact TC ROUTER 3002T-3G, a device commonly used in industrial and critical infrastructure networks for secure communications. The vulnerability is classified under CWE-94, indicating improper control over code generation, specifically code injection. The flaw exists in the router's config-upload endpoint, which allows an unauthenticated remote attacker to trick a high-privileged user into uploading a malicious configuration payload. This payload, when processed by the device, leads to arbitrary code execution with root privileges. The attack vector requires no authentication (AV:N), has low complexity (AC:L), and does not require privileges (PR:N), but does require user interaction (UI:R), such as convincing an authorized user to upload the malicious config. The impact is severe, causing total compromise of confidentiality, integrity, and availability of the device and potentially the network it protects. The vulnerability is particularly dangerous because it allows remote exploitation without prior access credentials, enabling attackers to gain full control over the router. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. Given the router's role in industrial control systems and critical infrastructure, exploitation could lead to significant operational disruptions and data breaches.

Potential Impact

For European organizations, especially those in industrial sectors such as manufacturing, energy, utilities, and transportation, this vulnerability poses a critical risk. The TC ROUTER 3002T-3G is often deployed in environments requiring secure and reliable communications, including SCADA and ICS networks. Exploitation could allow attackers to disrupt operational technology systems, cause downtime, manipulate sensitive data, or pivot to other internal systems, leading to widespread operational and financial damage. The total loss of confidentiality, integrity, and availability could result in safety incidents, regulatory non-compliance, and reputational harm. Given the high connectivity of European critical infrastructure and the increasing targeting by sophisticated threat actors, this vulnerability could be leveraged in targeted attacks or ransomware campaigns. The requirement for user interaction means social engineering or phishing could be used to facilitate exploitation, increasing the attack surface. The absence of patches further exacerbates the risk, necessitating immediate compensating controls.

Mitigation Recommendations

Until an official patch is released by Phoenix Contact, European organizations should implement strict operational controls to mitigate this vulnerability. These include: 1) Restricting access to the config-upload endpoint via network segmentation and firewall rules, limiting it only to trusted management networks and users. 2) Implementing strict user training and awareness programs to prevent social engineering attacks that could trick privileged users into uploading malicious configurations. 3) Monitoring and logging all configuration upload activities to detect suspicious or unauthorized attempts. 4) Employing multi-factor authentication and role-based access controls for all management interfaces to reduce the risk of unauthorized access. 5) Using network intrusion detection/prevention systems (IDS/IPS) to identify anomalous traffic patterns related to config uploads. 6) Isolating critical routers from general enterprise networks to minimize exposure. 7) Preparing incident response plans specifically addressing potential exploitation scenarios. Organizations should also maintain close communication with Phoenix Contact for timely patch releases and apply updates immediately upon availability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.313Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6965faafa60475309f41c759

Added to database: 1/13/2026, 7:56:31 AM

Last enriched: 1/13/2026, 8:11:00 AM

Last updated: 1/13/2026, 10:31:56 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats