This vulnerability allows malicious actors to execute arbitrary commands on the underlying system of the Zenitel ICX500 and ICX510 Gateway, granting shell access. Exploitation can compromise the device’s availability, confidentiality, and integrity.
History

Mon, 29 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 26 Sep 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Zenitel
Zenitel icx500
Zenitel icx510
Vendors & Products Zenitel
Zenitel icx500
Zenitel icx510

Fri, 26 Sep 2025 06:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Thu, 25 Sep 2025 19:45:00 +0000

Type Values Removed Values Added
Description This vulnerability allows malicious actors to execute arbitrary commands on the underlying system of the Zenitel ICX500 and ICX510 Gateway, granting shell access. Exploitation can compromise the device’s availability, confidentiality, and integrity.
Title Authenticated Remote Code Execution in the Billing Administration portal
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published: 2025-09-25T19:29:50.228Z

Updated: 2025-09-29T17:15:41.293Z

Reserved: 2025-09-22T10:23:28.574Z

Link: CVE-2025-59815

cve-icon Vulnrichment

Updated: 2025-09-29T17:15:35.905Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-25T20:15:35.510

Modified: 2025-09-26T14:32:19.853

Link: CVE-2025-59815

cve-icon Redhat

No data.