A vulnerability was found in Pepperl+Fuchs ICDM-RX, TCP-DB9, RJ45-DIN, TCP-ST, TCP-4DB9, 2RJ45-DIN, RJ45-PM, TCP-2DB9, TCP-2ST, 2RJ45-PM, TCP-8DB9, TCP-16RJ45, RJ45-RM, TCP-16DB9, TCP-32RJ45, RJ45-PM2, PN-DB9, PN-ST, PN-4DB9, PN-2DB9, PN-2ST, PN1-DB9, PN1-ST, PN1-2DB9, PN1-4DB9, PN1-2ST, EN-DB9, EN-ST, EN-4DB9, EN-2DB9, EN-2ST, EN1-DB9, EN1-ST, EN1-2DB9, EN1-4DB9, EN1-2ST, MOD-DB9, MOD-ST, MOD-4DB9, MOD-2DB9, MOD-2ST and MOD-16RJ45. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting.
This vulnerability is handled as CVE-2024-38501. The attack may be launched remotely. There is no exploit available.