← Volver a CVEs
CVE-2025-34093
N/ADescripcion
An authenticated command injection vulnerability exists in the Polycom HDX Series command shell interface accessible over Telnet. The lan traceroute command in the devcmds console accepts unsanitized input, allowing attackers to execute arbitrary system commands. By injecting shell metacharacters through the traceroute interface, an attacker can achieve remote code execution under the context of the root user. This flaw affects systems where Telnet access is enabled and either unauthenticated access is allowed or credentials are known.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado7/10/2025
Ultima modificacion7/15/2025
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-78
Referencias
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/misc/polycom_hdx_traceroute_exec.rb(disclosure@vulncheck.com)
https://staaldraad.github.io/2017/11/12/polycom-hdx-rce/(disclosure@vulncheck.com)
https://vulncheck.com/advisories/polycom-hdx-series-telnet-rce(disclosure@vulncheck.com)
https://web.archive.org/web/20200312205144/http://support.polycom.com/content/dam/polycom-support/global/documentation/securityadvisory-remotecodeexecutionon-hdx-v0.3-hotfix-release.pdf(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/24494(disclosure@vulncheck.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.