A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-DevicesListeningOnAPort instruction prior V21. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Dec 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer
Teamviewer dex |
|
| Vendors & Products |
Teamviewer
Teamviewer dex |
Thu, 11 Dec 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-DevicesListeningOnAPort instruction prior V21. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform. | |
| Title | Command Injection in 1E-Explorer-TachyonCore-DevicesListeningOnAPort Instruction | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TV
Published: 2025-12-11T11:26:13.379Z
Updated: 2025-12-11T17:08:36.984Z
Reserved: 2025-11-12T08:16:25.591Z
Link: CVE-2025-64986
Updated: 2025-12-11T17:08:25.491Z
Status : Received
Published: 2025-12-11T12:16:25.400
Modified: 2025-12-11T12:16:25.400
Link: CVE-2025-64986
No data.