This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://wiki.zenitel.com/wiki/Downloads#Stations_and_Devices |
![]() ![]() |
History
Thu, 25 Sep 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity. | |
Title | Authenticated Remote Code Execution in zForm_auto_config | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: NCSC-NL
Published:
Updated: 2025-09-25T19:30:15.139Z
Reserved: 2025-09-22T10:23:28.574Z
Link: CVE-2025-59817

No data.

Status : Received
Published: 2025-09-25T20:15:35.780
Modified: 2025-09-25T20:15:35.780
Link: CVE-2025-59817

No data.

No data.