A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-DevicesListeningOnAPort instruction prior V21. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
History

Thu, 11 Dec 2025 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Teamviewer
Teamviewer dex
Vendors & Products Teamviewer
Teamviewer dex

Thu, 11 Dec 2025 11:45:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-DevicesListeningOnAPort instruction prior V21. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
Title Command Injection in 1E-Explorer-TachyonCore-DevicesListeningOnAPort Instruction
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published: 2025-12-11T11:26:13.379Z

Updated: 2025-12-11T17:08:36.984Z

Reserved: 2025-11-12T08:16:25.591Z

Link: CVE-2025-64986

cve-icon Vulnrichment

Updated: 2025-12-11T17:08:25.491Z

cve-icon NVD

Status : Received

Published: 2025-12-11T12:16:25.400

Modified: 2025-12-11T12:16:25.400

Link: CVE-2025-64986

cve-icon Redhat

No data.