CVE-2025-64986

Source
https://cve.org/CVERecord?id=CVE-2025-64986
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64986.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-64986
Published
2025-12-11T12:16:25.400Z
Modified
2026-03-13T03:38:33.093201Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-DevicesListeningOnAPort instruction prior V21. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64986.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "21.0"
            }
        ]
    }
]