CVE-2025-59818
EUVD-2025-20681104.02.2026, 11:16
This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| zenitel | tcis-3_firmware | 𝑥 < 9.2.3.3 |
𝑥
= Vulnerable software versions
References