A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-PatchInsights-Deploy instruction prior V15. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
History

Thu, 11 Dec 2025 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Teamviewer
Teamviewer dex
Vendors & Products Teamviewer
Teamviewer dex

Thu, 11 Dec 2025 11:45:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-PatchInsights-Deploy instruction prior V15. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
Title Command Injection in 1E-PatchInsights-Deploy Instruction
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published: 2025-12-11T11:28:16.281Z

Updated: 2025-12-11T16:17:11.880Z

Reserved: 2025-11-12T08:16:25.592Z

Link: CVE-2025-64991

cve-icon Vulnrichment

Updated: 2025-12-11T16:17:08.544Z

cve-icon NVD

Status : Received

Published: 2025-12-11T12:16:26.063

Modified: 2025-12-11T12:16:26.063

Link: CVE-2025-64991

cve-icon Redhat

No data.