Description

This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.

INFO

Published Date :

2026-02-04T10:26:53.102Z

Last Modified :

2026-02-04T15:10:45.940Z

Source :

NCSC-NL
AFFECTED PRODUCTS

The following products are affected by CVE-2025-59818 vulnerability.

Vendors Products
Zenitel
  • Tcis-3
  • Tcis-3+
  • Tcis-3 Firmware

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact