This vulnerability allows authenticated attackers to execute commands via the hostname of the device.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 09 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Zenitel
Zenitel tcis-3+
Vendors & Products Zenitel
Zenitel tcis-3+

Fri, 09 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
Description This vulnerability allows authenticated attackers to execute commands via the hostname of the device.
Title Authenticated Remote Code Execution in device hostname
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published:

Updated: 2026-01-09T18:01:00.742Z

Reserved: 2025-10-27T09:43:10.200Z

Link: CVE-2025-64090

cve-icon Vulnrichment

Updated: 2026-01-09T18:00:38.167Z

cve-icon NVD

Status : Received

Published: 2026-01-09T10:15:46.480

Modified: 2026-01-09T18:15:49.873

Link: CVE-2025-64090

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-09T13:23:29Z

Weaknesses