Summary
Multiple vulnerabilities have been identified in the FL SWITCH 2xxx firmware prior to version 3.50. Two of these (CVE-2025-41692 and CVE-2025-41696) enable an attacker to access the device's file system. Two other vulnerabilities (CVE-2025-41693 and CVE-2025-41694) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2025-41697) allows an unauthenticated physical attacker to access a login shell via an undocumented UART port. Furthermore, there are multiple vulnerabilities relating to reflected cross-site scripting in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.50.
Impact
Availability, integrity, or confidentiality of the FL SWITCH 2xxx can be compromised by attacks using these vulnerabilities.
Affected Product(s)
| Model no. | Product name | Affected versions |
|---|---|---|
| 2702881 | FL NAT 2008 | Firmware <3.50 |
| 2702882 | FL NAT 2208 | Firmware <3.50 |
| 2702981 | FL NAT 2304-2GC-2SFP | Firmware <3.50 |
| 2702323 | FL SWITCH 2005 | Firmware <3.50 |
| 2702324 | FL SWITCH 2008 | Firmware <3.50 |
| 1106707 | FL SWITCH 2008F | Firmware <3.50 |
| 2702903 | FL SWITCH 2016 | Firmware <3.50 |
| 2702665 | FL SWITCH 2105 | Firmware <3.50 |
| 2702666 | FL SWITCH 2108 | Firmware <3.50 |
| 2702908 | FL SWITCH 2116 | Firmware <3.50 |
| 2702334 | FL SWITCH 2204-2TC-2SFX | Firmware <3.50 |
| 2702326 | FL SWITCH 2205 | Firmware <3.50 |
| 2702330 | FL SWITCH 2206-2FX | Firmware <3.50 |
| 2702331 | FL SWITCH 2206-2FX SM | Firmware <3.50 |
| 2702333 | FL SWITCH 2206-2FX SM ST | Firmware <3.50 |
| 2702332 | FL SWITCH 2206-2FX ST | Firmware <3.50 |
| 2702969 | FL SWITCH 2206-2SFX | Firmware <3.50 |
| 1044028 | FL SWITCH 2206-2SFX PN | Firmware <3.50 |
| 1095628 | FL SWITCH 2206C-2FX | Firmware <3.50 |
| 2702328 | FL SWITCH 2207-FX | Firmware <3.50 |
| 2702329 | FL SWITCH 2207-FX SM | Firmware <3.50 |
| 2702327 | FL SWITCH 2208 | Firmware <3.50 |
| 1044024 | FL SWITCH 2208 PN | Firmware <3.50 |
| 1095627 | FL SWITCH 2208C | Firmware <3.50 |
| 2702907 | FL SWITCH 2212-2TC-2SFX | Firmware <3.50 |
| 2702905 | FL SWITCH 2214-2FX | Firmware <3.50 |
| 2702906 | FL SWITCH 2214-2FX SM | Firmware <3.50 |
| 1006188 | FL SWITCH 2214-2SFX | Firmware <3.50 |
| 1044030 | FL SWITCH 2214-2SFX PN | Firmware <3.50 |
| 2702904 | FL SWITCH 2216 | Firmware <3.50 |
| 1044029 | FL SWITCH 2216 PN | Firmware <3.50 |
| 1278397 | FL SWITCH 2303-8SP1 | Firmware <3.50 |
| 2702653 | FL SWITCH 2304-2GC-2SFP | Firmware <3.50 |
| 2702970 | FL SWITCH 2306-2SFP | Firmware <3.50 |
| 1009222 | FL SWITCH 2306-2SFP PN | Firmware <3.50 |
| 2702652 | FL SWITCH 2308 | Firmware <3.50 |
| 1009220 | FL SWITCH 2308 PN | Firmware <3.50 |
| 2702910 | FL SWITCH 2312-2GC-2SFP | Firmware <3.50 |
| 1006191 | FL SWITCH 2314-2SFP | Firmware <3.50 |
| 1031683 | FL SWITCH 2314-2SFP PN | Firmware <3.50 |
| 2702909 | FL SWITCH 2316 | Firmware <3.50 |
| 1031673 | FL SWITCH 2316 PN | Firmware <3.50 |
| 1184084 | FL SWITCH 2316/K1 | Firmware <3.50 |
| 1088853 | FL SWITCH 2404-2TC-2SFX | Firmware <3.50 |
| 1043414 | FL SWITCH 2406-2SFX | Firmware <3.50 |
| 1089126 | FL SWITCH 2406-2SFX PN | Firmware <3.50 |
| 1043412 | FL SWITCH 2408 | Firmware <3.50 |
| 1089133 | FL SWITCH 2408 PN | Firmware <3.50 |
| 1088875 | FL SWITCH 2412-2TC-2SFX | Firmware <3.50 |
| 1043423 | FL SWITCH 2414-2SFX | Firmware <3.50 |
| 1089139 | FL SWITCH 2414-2SFX PN | Firmware <3.50 |
| 1043416 | FL SWITCH 2416 | Firmware <3.50 |
| 1089150 | FL SWITCH 2416 PN | Firmware <3.50 |
| 1088872 | FL SWITCH 2504-2GC-2SFP | Firmware <3.50 |
| 1043491 | FL SWITCH 2506-2SFP | Firmware <3.50 |
| 1089135 | FL SWITCH 2506-2SFP PN | Firmware <3.50 |
| 1215329 | FL SWITCH 2506-2SFP/K1 | Firmware <3.50 |
| 1043484 | FL SWITCH 2508 | Firmware <3.50 |
| 1089134 | FL SWITCH 2508 PN | Firmware <3.50 |
| 1215350 | FL SWITCH 2508/K1 | Firmware <3.50 |
| 1088856 | FL SWITCH 2512-2GC-2SFP | Firmware <3.50 |
| 1043499 | FL SWITCH 2514-2SFP | Firmware <3.50 |
| 1089154 | FL SWITCH 2514-2SFP PN | Firmware <3.50 |
| 1043496 | FL SWITCH 2516 | Firmware <3.50 |
| 1089205 | FL SWITCH 2516 PN | Firmware <3.50 |
| 1106500 | FL SWITCH 2608 | Firmware <3.50 |
| 1106616 | FL SWITCH 2608 PN | Firmware <3.50 |
| 1106615 | FL SWITCH 2708 | Firmware <3.50 |
| 1106610 | FL SWITCH 2708 PN | Firmware <3.50 |
Vulnerabilities
Expand / Collapse allA XSS vulnerability in pxc_portSfp.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
A XSS vulnerability in pxc_portCntr.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
A XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
A XSS vulnerability in port_util.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
A XSS vulnerability in pxc_Dot1xCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
A XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
A XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
A XSS vulnerability in pxc_portCntr2.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
A XSS vulnerability in dyn_conn.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
An attacker can use an undocumented UART port on the PCB as a side-channel to get root access e.g. with the credentials obtained from CVE-2025-41692.
A high privileged remote attacker with admin privileges for the webUI can brute-force the "root" and "user" passwords of the underlying OS due to a weak password generation algorithm.
A low privileged remote attacker can run the webshell with an empty command containing whitespace. The server will then block until it receives more data, resulting in a DoS condition of the websserver.
An attacker can use an undocumented UART port on the PCB as a side-channel with the user hardcoded credentials obtained from CVE-2025-41692 to gain read access to parts of the filesystem of the device.
A low privileged remote attacker can use the ssh feature to execute commands directly after login. The process stays open and uses resources which leads to a reduced performance of the management functions. Switching functionality is not affected.
Remediation
Phoenix Contact recommends to update to the latest 3.50 Firmware Release which fixes these vulnerabilities.
Acknowledgments
Phoenix Contact GmbH & Co. KG thanks the following parties for their efforts:
- CERT@VDE for coordination. (see https://certvde.com )
- D. Blagojevic, S. Dietz, F. Koroknai, T. Weber from CyberDanube for Reporting
Revision History
| Version | Date | Summary |
|---|---|---|
| 1.0.0 | 12/09/2025 09:00 | Initial release. |
| 2.0.0 | 01/12/2026 09:00 | Version range specifier and product idfentification helper added to firmware branch of product tree. |