Vulnerabilities
Vulnerable Software
Phoenixcontact:  >> Proconos  Security Vulnerabilities
An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
CVSS Score
9.8
EPSS Score
0.007
Published
2022-06-21


Contact Us

Shodan ® - All rights reserved