This vulnerability allows network-adjacent attackers to injection malicious content into log files on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of logging. The issue results from insufficient neutralization of special characters when writing to logs. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.