validation of user-supplied input. Validation fails to enforce
sufficient formatting rules, which could permit attackers to append
arbitrary data. This could allow an unauthenticated attacker to inject
arbitrary commands.
No advisories yet.
Solution
Zenitel recommends users to upgrade to Version 9.3.3.0 or later https://wiki.zenitel.com/wiki/Downloads#Station_and_Device_Firmware_Package_.28VS-IS.29 .
Workaround
No workaround given by the vendor.
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenitel
Zenitel tciv-3+ |
|
| Vendors & Products |
Zenitel
Zenitel tciv-3+ |
Wed, 26 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists due to incomplete validation of user-supplied input. Validation fails to enforce sufficient formatting rules, which could permit attackers to append arbitrary data. This could allow an unauthenticated attacker to inject arbitrary commands. | |
| Title | Zenitel TCIV-3+ OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-26T19:13:49.932Z
Reserved: 2025-10-27T18:03:35.897Z
Link: CVE-2025-64128
Updated: 2025-11-26T19:13:47.049Z
Status : Awaiting Analysis
Published: 2025-11-26T18:15:49.650
Modified: 2025-12-01T15:39:53.100
Link: CVE-2025-64128
No data.
OpenCVE Enrichment
Updated: 2025-11-27T16:26:34Z