Impact
This vulnerability is a command injection flaw (CWE-78) in the lan traceroute command of the Polycom HDX Series telnet shell. Unsanitized input lets an attacker inject shell metacharacters, allowing arbitrary executable commands to be run with root privileges. The flaw can be triggered through the devcmds console accessible over Telnet, giving remote code execution as root.
Affected Systems
Affected systems are Polycom HDX Series devices that have Telnet enabled. The vulnerability manifests when the lan traceroute command is used; it affects all firmware releases of the HDX Series for which the command is present. No specific version range is listed in the CNA data, so any device with Telnet service and the devcmds console is potentially vulnerable.
Risk and Exploitability
The CVSS score of 7.5 indicates a high risk of impact, while the EPSS score of 51% suggests a moderate‑high likelihood that attackers may target affected systems. The vulnerability is not yet in the CISA KEV catalog, but its exploitability via authenticated or known‑credential Telnet sessions makes it a serious threat. Attackers need the ability to connect over Telnet and either have valid credentials or the device must allow unauthenticated access to exploit the flaw.
OpenCVE Enrichment
EUVD