No analysis available yet.
Vendor Solution
On-prem users: Update to the latest available version (v21 or later). SaaS instances have been updated automatically.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 14 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer digital Employee Experience
|
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Teamviewer digital Employee Experience
|
Thu, 11 Dec 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer
Teamviewer dex |
|
| Vendors & Products |
Teamviewer
Teamviewer dex |
Thu, 11 Dec 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-DevicesListeningOnAPort instruction prior V21. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform. | |
| Title | Command Injection in 1E-Explorer-TachyonCore-DevicesListeningOnAPort Instruction | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2025-12-11T17:08:36.984Z
Reserved: 2025-11-12T08:16:25.591Z
Link: CVE-2025-64986
Updated: 2025-12-11T17:08:25.491Z
Status : Analyzed
Published: 2025-12-11T12:16:25.400
Modified: 2026-01-14T20:00:20.610
Link: CVE-2025-64986
No data.
OpenCVE Enrichment
Updated: 2025-12-11T16:20:02Z