PT-2025-29136 · Polycom · Polycom Hdx Series

Etienne Stalmans

·

Published

2025-07-10

·

Updated

2025-07-11

·

CVE-2025-34093

CVSS v4.0
7.5
VectorAV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions:

Polycom HDX Series (affected versions not specified)

Description:

An authenticated command injection vulnerability exists in the Polycom HDX Series command shell interface accessible over Telnet. The `lan traceroute` command in the `devcmds` console accepts unsanitized input, allowing attackers to execute arbitrary system commands. By injecting shell metacharacters through the traceroute interface, an attacker can achieve remote code execution under the context of the root user. This flaw affects systems where Telnet access is enabled and either unauthenticated access is allowed or credentials are known.

Recommendations:

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

RCE

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2025-34093

Affected Products

Polycom Hdx Series