validation. The application accepts a parameter directly from user input
without verifying it is a valid IP address or filtering potentially
malicious characters. This could allow an unauthenticated attacker to
inject arbitrary commands.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Zenitel recommends users to upgrade to Version 9.3.3.0 or later https://wiki.zenitel.com/wiki/Downloads#Station_and_Device_Firmware_Package_.28VS-IS.29 .
Workaround
No workaround given by the vendor.
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenitel
Zenitel tciv-3+ |
|
| Vendors & Products |
Zenitel
Zenitel tciv-3+ |
Wed, 26 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists due to improper input validation. The application accepts a parameter directly from user input without verifying it is a valid IP address or filtering potentially malicious characters. This could allow an unauthenticated attacker to inject arbitrary commands. | |
| Title | Zenitel TCIV-3+ OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-26T17:47:05.385Z
Reserved: 2025-10-27T18:03:35.897Z
Link: CVE-2025-64126
No data.
Status : Awaiting Analysis
Published: 2025-11-26T18:15:49.043
Modified: 2025-12-01T15:39:53.100
Link: CVE-2025-64126
No data.
OpenCVE Enrichment
Updated: 2025-11-27T16:26:42Z