← Zuruck zu CVEs
CVE-2025-34093
N/ABeschreibung
An authenticated command injection vulnerability exists in the Polycom HDX Series command shell interface accessible over Telnet. The lan traceroute command in the devcmds console accepts unsanitized input, allowing attackers to execute arbitrary system commands. By injecting shell metacharacters through the traceroute interface, an attacker can achieve remote code execution under the context of the root user. This flaw affects systems where Telnet access is enabled and either unauthenticated access is allowed or credentials are known.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht7/10/2025
Zuletzt geandert7/15/2025
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-78
Referenzen
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/misc/polycom_hdx_traceroute_exec.rb(disclosure@vulncheck.com)
https://staaldraad.github.io/2017/11/12/polycom-hdx-rce/(disclosure@vulncheck.com)
https://vulncheck.com/advisories/polycom-hdx-series-telnet-rce(disclosure@vulncheck.com)
https://web.archive.org/web/20200312205144/http://support.polycom.com/content/dam/polycom-support/global/documentation/securityadvisory-remotecodeexecutionon-hdx-v0.3-hotfix-release.pdf(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/24494(disclosure@vulncheck.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.