sanitization of user-supplied input. The application accepts parameters
that are later incorporated into OS commands without adequate
validation. This could allow an unauthenticated attacker to execute
arbitrary commands remotely.
No advisories yet.
Solution
Zenitel recommends users to upgrade to Version 9.3.3.0 or later https://wiki.zenitel.com/wiki/Downloads#Station_and_Device_Firmware_Package_.28VS-IS.29 .
Workaround
No workaround given by the vendor.
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenitel
Zenitel tciv-3+ |
|
| Vendors & Products |
Zenitel
Zenitel tciv-3+ |
Wed, 26 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists due to insufficient sanitization of user-supplied input. The application accepts parameters that are later incorporated into OS commands without adequate validation. This could allow an unauthenticated attacker to execute arbitrary commands remotely. | |
| Title | Zenitel TCIV-3+ OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-26T19:31:02.691Z
Reserved: 2025-10-27T18:03:35.897Z
Link: CVE-2025-64127
Updated: 2025-11-26T19:30:59.069Z
Status : Awaiting Analysis
Published: 2025-11-26T18:15:49.243
Modified: 2025-12-01T15:39:53.100
Link: CVE-2025-64127
No data.
OpenCVE Enrichment
Updated: 2025-11-27T16:25:54Z