validation. The application accepts a parameter directly from user input
without verifying it is a valid IP address or filtering potentially
malicious characters. This could allow an unauthenticated attacker to
inject arbitrary commands.
No analysis available yet.
Vendor Solution
Zenitel recommends users to upgrade to Version 9.3.3.0 or later https://wiki.zenitel.com/wiki/Downloads#Station_and_Device_Firmware_Package_.28VS-IS.29 .
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 03 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenitel
Zenitel tciv-3+ |
|
| Vendors & Products |
Zenitel
Zenitel tciv-3+ |
Wed, 26 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists due to improper input validation. The application accepts a parameter directly from user input without verifying it is a valid IP address or filtering potentially malicious characters. This could allow an unauthenticated attacker to inject arbitrary commands. | |
| Title | Zenitel TCIV-3+ OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-12-03T16:24:46.181Z
Reserved: 2025-10-27T18:03:35.897Z
Link: CVE-2025-64126
Updated: 2025-12-03T16:24:43.895Z
Status : Deferred
Published: 2025-11-26T18:15:49.043
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-64126
No data.
OpenCVE Enrichment
Updated: 2025-11-27T16:26:42Z