Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 10 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenitel icx500 Firmware
Zenitel icx510 Firmware |
|
| CPEs | cpe:2.3:h:zenitel:icx500:-:*:*:*:*:*:*:* cpe:2.3:h:zenitel:icx510:-:*:*:*:*:*:*:* cpe:2.3:o:zenitel:icx500_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zenitel:icx510_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Zenitel icx500 Firmware
Zenitel icx510 Firmware |
Fri, 09 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
ssvc
|
Fri, 09 Jan 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenitel
Zenitel icx500 Zenitel icx510 |
|
| Vendors & Products |
Zenitel
Zenitel icx500 Zenitel icx510 |
Fri, 09 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Remote Code Execution vulnerability that allows unauthenticated attackers to inject arbitrary commands into the hostname of the device. | |
| Title | Unauthenticated Remote Code Execution via the device hostname | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: NCSC-NL
Published:
Updated: 2026-01-09T17:58:19.551Z
Reserved: 2025-10-27T09:43:10.201Z
Link: CVE-2025-64093
Updated: 2026-01-09T17:58:08.571Z
Status : Analyzed
Published: 2026-01-09T10:15:46.890
Modified: 2026-02-10T20:33:36.620
Link: CVE-2025-64093
No data.
OpenCVE Enrichment
Updated: 2026-01-09T13:23:58Z