CVE-2025-64127 – Zenitel TCIV-3+ OS Command Injection

The following table lists the changes that have been made to the
CVE-2025-64127 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Nov. 26, 2025

    Action Type Old Value New Value
    Added Description An OS command injection vulnerability exists due to insufficient
    sanitization of user-supplied input. The application accepts parameters
    that are later incorporated into OS commands without adequate
    validation. This could allow an unauthenticated attacker to execute
    arbitrary commands remotely.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    Added CWE CWE-78
    Added Reference https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-329-03.json
    Added Reference https://wiki.zenitel.com/wiki/Downloads#Station_and_Device_Firmware_Package_.28VS-IS.29
    Added Reference https://www.cisa.gov/news-events/ics-advisories/icsa-25-329-03
Share the Post:

Related Posts