Home

Description

The Telenium Online Web Application is vulnerable due to a PHP endpoint accessible to unauthenticated network users that improperly handles user-supplied input. This vulnerability occurs due to the insecure termination of a regular expression check within the endpoint. Because the input is not correctly validated or sanitized, an unauthenticated attacker can inject arbitrary operating system commands through a crafted HTTP request, leading to remote code execution on the server in the context of the web application service account.

PUBLISHED Reserved 2025-09-17 | Published 2025-09-30 | Updated 2025-09-30 | Assigner icscert




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

Any version
affected

Credits

Scott Sheach reported this vulnerability to MegaSys Enterprises. finder

References

www.cisa.gov/news-events/ics-advisories/icsa-25-273-01

support.portal.megasys.com/

cve.org (CVE-2025-10659)

nvd.nist.gov (CVE-2025-10659)

Download JSON