This vulnerability allows authenticated attackers to execute commands via the hostname of the device.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 10 Jan 2026 03:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-77
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 22:30:00 +0900

Type Values Removed Values Added
First Time appeared Zenitel
Zenitel tcis-3+
Vendors & Products Zenitel
Zenitel tcis-3+

Fri, 09 Jan 2026 19:15:00 +0900

Type Values Removed Values Added
Description This vulnerability allows authenticated attackers to execute commands via the hostname of the device.
Title Authenticated Remote Code Execution in device hostname
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published:

Updated: 2026-01-09T18:01:00.742Z

Reserved: 2025-10-27T09:43:10.200Z

Link: CVE-2025-64090

cve-icon Vulnrichment

Updated: 2026-01-09T18:00:38.167Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-09T10:15:46.480

Modified: 2026-01-13T14:03:46.203

Link: CVE-2025-64090

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-09T22:23:29Z

Weaknesses