validation. The application accepts a parameter directly from user input
without verifying it is a valid IP address or filtering potentially
malicious characters. This could allow an unauthenticated attacker to
inject arbitrary commands.
No advisories yet.
Solution
Zenitel recommends users to upgrade to Version 9.3.3.0 or later https://wiki.zenitel.com/wiki/Downloads#Station_and_Device_Firmware_Package_.28VS-IS.29 .
Workaround
No workaround given by the vendor.
Wed, 03 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenitel
Zenitel tciv-3+ |
|
| Vendors & Products |
Zenitel
Zenitel tciv-3+ |
Wed, 26 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists due to improper input validation. The application accepts a parameter directly from user input without verifying it is a valid IP address or filtering potentially malicious characters. This could allow an unauthenticated attacker to inject arbitrary commands. | |
| Title | Zenitel TCIV-3+ OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-12-03T16:24:46.181Z
Reserved: 2025-10-27T18:03:35.897Z
Link: CVE-2025-64126
Updated: 2025-12-03T16:24:43.895Z
Status : Awaiting Analysis
Published: 2025-11-26T18:15:49.043
Modified: 2025-12-01T15:39:53.100
Link: CVE-2025-64126
No data.
OpenCVE Enrichment
Updated: 2025-11-27T16:26:42Z