Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote malicious users to execute arbitrary commands via protocol-compliant traffic.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
phoenixcontact-software multiprog 5.0 |
||
phoenixcontact-software proconos eclr |