An OS command injection vulnerability exists due to improper input
validation. The application accepts a parameter directly from user input
without verifying it is a valid IP address or filtering potentially
malicious characters. This could allow an unauthenticated attacker to
inject arbitrary commands.
Advisories

No advisories yet.

Fixes

Solution

Zenitel recommends users to upgrade to Version 9.3.3.0 or later https://wiki.zenitel.com/wiki/Downloads#Station_and_Device_Firmware_Package_.28VS-IS.29 .


Workaround

No workaround given by the vendor.

History

Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Zenitel
Zenitel tciv-3+
Vendors & Products Zenitel
Zenitel tciv-3+

Wed, 26 Nov 2025 18:00:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability exists due to improper input validation. The application accepts a parameter directly from user input without verifying it is a valid IP address or filtering potentially malicious characters. This could allow an unauthenticated attacker to inject arbitrary commands.
Title Zenitel TCIV-3+ OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-11-26T17:47:05.385Z

Reserved: 2025-10-27T18:03:35.897Z

Link: CVE-2025-64126

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-26T18:15:49.043

Modified: 2025-12-01T15:39:53.100

Link: CVE-2025-64126

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-27T16:26:42Z