Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31157 | This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://wiki.zenitel.com/wiki/Downloads#Stations_and_Devices |
|
Mon, 29 Sep 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 26 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenitel
Zenitel tcis-3+ |
|
| Vendors & Products |
Zenitel
Zenitel tcis-3+ |
Fri, 26 Sep 2025 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 25 Sep 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity. | |
| Title | Authenticated Remote Code Execution in zForm_auto_config | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: NCSC-NL
Published:
Updated: 2025-09-29T17:11:42.964Z
Reserved: 2025-09-22T10:23:28.574Z
Link: CVE-2025-59817
Updated: 2025-09-29T17:11:36.297Z
Status : Awaiting Analysis
Published: 2025-09-25T20:15:35.780
Modified: 2025-09-26T14:32:19.853
Link: CVE-2025-59817
No data.
OpenCVE Enrichment
Updated: 2025-09-26T11:35:36Z
EUVD