This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity.
History

Mon, 29 Sep 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 26 Sep 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Zenitel
Zenitel tcis-3+
Vendors & Products Zenitel
Zenitel tcis-3+

Fri, 26 Sep 2025 06:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Thu, 25 Sep 2025 19:45:00 +0000

Type Values Removed Values Added
Description This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity.
Title Authenticated Remote Code Execution in zForm_auto_config
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published: 2025-09-25T19:30:15.139Z

Updated: 2025-09-29T17:11:42.964Z

Reserved: 2025-09-22T10:23:28.574Z

Link: CVE-2025-59817

cve-icon Vulnrichment

Updated: 2025-09-29T17:11:36.297Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-25T20:15:35.780

Modified: 2025-09-26T14:32:19.853

Link: CVE-2025-59817

cve-icon Redhat

No data.