Description
This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.
Published: 2026-02-04
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Zenitel tcis-3
Zenitel tcis-3 Firmware
CPEs cpe:2.3:h:zenitel:tcis-3:-:*:*:*:*:*:*:*
cpe:2.3:o:zenitel:tcis-3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Zenitel tcis-3
Zenitel tcis-3 Firmware

Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Zenitel
Zenitel tcis-3+
Vendors & Products Zenitel
Zenitel tcis-3+

Wed, 04 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 10:45:00 +0000

Type Values Removed Values Added
Description This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.
Title Authenticated Remote Code Execution via the file name of an uploaded file
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Zenitel Tcis-3 Tcis-3+ Tcis-3 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published:

Updated: 2026-02-04T15:10:45.940Z

Reserved: 2025-09-22T10:23:28.574Z

Link: CVE-2025-59818

cve-icon Vulnrichment

Updated: 2026-02-04T15:10:33.719Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T11:16:01.233

Modified: 2026-02-11T20:20:07.400

Link: CVE-2025-59818

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-04T21:18:20Z

Weaknesses