This vulnerability allows authenticated attackers to execute commands via the hostname of the device.
History

Fri, 09 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Zenitel
Zenitel tcis-3+
Vendors & Products Zenitel
Zenitel tcis-3+

Fri, 09 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
Description This vulnerability allows authenticated attackers to execute commands via the hostname of the device.
Title Authenticated Remote Code Execution in device hostname
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published:

Updated: 2026-01-09T18:01:00.742Z

Reserved: 2025-10-27T09:43:10.200Z

Link: CVE-2025-64090

cve-icon Vulnrichment

Updated: 2026-01-09T18:00:38.167Z

cve-icon NVD

Status : Received

Published: 2026-01-09T10:15:46.480

Modified: 2026-01-09T18:15:49.873

Link: CVE-2025-64090

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-09T13:23:29Z