An OS command injection vulnerability exists due to incomplete validation of user-supplied input. Validation fails to enforce sufficient formatting rules, which could permit attackers to append arbitrary data. This could allow an unauthenticated attacker to inject arbitrary commands.
History

Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Zenitel
Zenitel tciv-3+
Vendors & Products Zenitel
Zenitel tciv-3+

Wed, 26 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 26 Nov 2025 18:00:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability exists due to incomplete validation of user-supplied input. Validation fails to enforce sufficient formatting rules, which could permit attackers to append arbitrary data. This could allow an unauthenticated attacker to inject arbitrary commands.
Title Zenitel TCIV-3+ OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2025-11-26T17:51:23.485Z

Updated: 2025-11-26T19:13:49.932Z

Reserved: 2025-10-27T18:03:35.897Z

Link: CVE-2025-64128

cve-icon Vulnrichment

Updated: 2025-11-26T19:13:47.049Z

cve-icon NVD

Status : Received

Published: 2025-11-26T18:15:49.650

Modified: 2025-11-26T18:15:49.650

Link: CVE-2025-64128

cve-icon Redhat

No data.