Home
CRITICAL: 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HCRITICAL: 10.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:HDefault status
unaffected
Any version
affected
Description
An OS command injection vulnerability exists due to insufficient sanitization of user-supplied input. The application accepts parameters that are later incorporated into OS commands without adequate validation. This could allow an unauthenticated attacker to execute arbitrary commands remotely.
Problem types
Product status
Any version
Credits
Nir Tepper and Noam Moshe of Claroty Team82 reported these vulnerabilities to CISA.
References
wiki.zenitel.com/wiki/Downloads
www.cisa.gov/news-events/ics-advisories/icsa-25-329-03
github.com/...p/csaf_files/OT/white/2025/icsa-25-329-03.json