An OS command injection vulnerability exists due to improper input validation. The application accepts a parameter directly from user input without verifying it is a valid IP address or filtering potentially malicious characters. This could allow an unauthenticated attacker to inject arbitrary commands.
History

Wed, 26 Nov 2025 18:00:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability exists due to improper input validation. The application accepts a parameter directly from user input without verifying it is a valid IP address or filtering potentially malicious characters. This could allow an unauthenticated attacker to inject arbitrary commands.
Title Zenitel TCIV-3+ OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2025-11-26T17:47:05.385Z

Updated: 2025-11-26T17:47:05.385Z

Reserved: 2025-10-27T18:03:35.897Z

Link: CVE-2025-64126

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-26T18:15:49.043

Modified: 2025-11-26T18:15:49.043

Link: CVE-2025-64126

cve-icon Redhat

No data.