Multiple Phoenix Contact devices allow remote attackers to establish TCP sessions to port 1962 and obtain sensitive information or make changes, as demonstrated by using the Create Backup feature to traverse all directories.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.