EUVD-2025-21033

| CVE-2025-34093 HIGH
2025-07-10 [email protected]
7.5
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 06:52 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 06:52 euvd
EUVD-2025-21033
PoC Detected
Jul 15, 2025 - 13:14 vuln.today
Public exploit code
CVE Published
Jul 10, 2025 - 20:15 nvd
HIGH 7.5

Description

An authenticated command injection vulnerability exists in the Polycom HDX Series command shell interface accessible over Telnet. The lan traceroute command in the devcmds console accepts unsanitized input, allowing attackers to execute arbitrary system commands. By injecting shell metacharacters through the traceroute interface, an attacker can achieve remote code execution under the context of the root user. This flaw affects systems where Telnet access is enabled and either unauthenticated access is allowed or credentials are known.

Analysis

Polycom HDX Series video conferencing systems contain an authenticated command injection in the LAN traceroute function. The devcmds console accessible over Telnet allows injection of shell metacharacters through the traceroute target parameter, enabling arbitrary command execution on the conferencing endpoint.

Technical Context

The devcmds console accessible via Telnet provides network diagnostic commands. The lan traceroute command passes the target parameter to a system call without sanitization. An attacker with Telnet credentials can inject shell commands that execute on the Polycom device's underlying Linux system.

Affected Products

['Polycom HDX Series']

Remediation

Disable Telnet access and use SSH. Change default credentials. Isolate video conferencing endpoints on a dedicated VLAN. Monitor Telnet/SSH access logs for unauthorized logins.

Priority Score

104
Low Medium High Critical
KEV: 0
EPSS: +46.6
CVSS: +38
POC: +20

Share

EUVD-2025-21033 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy