PHOENIX CONTACT RAD-80211-XD
The RAD-80211-XD and RAD-80211-XD/HP-BUS wireless radio modules contain a command injection vulnerability (CWE-77) that allows an authenticated attacker to execute arbitrary system commands with administrative privileges on the device. The vulnerability has a CVSS score of 9.9 due to its ability to compromise confidentiality, integrity, and availability across connected systems. Phoenix Contact has removed these products from active maintenance due to obsolescence and will not provide a firmware patch. The vendor recommends upgrading to the active FL WLAN product line or restricting network access via firewall protection.
- Network access to the RAD-80211-XD radio module on port 80 or management interface
- Valid user login credentials for the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/01dd3e25-8727-4d70-8d0d-9c8eb9360318Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.