Metrics
Affected Vendors & Products
Thu, 02 Oct 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Megasys
Megasys telenium Online Web Application |
|
Vendors & Products |
Megasys
Megasys telenium Online Web Application |
Tue, 30 Sep 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 30 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Telenium Online Web Application is vulnerable due to a PHP endpoint accessible to unauthenticated network users that improperly handles user-supplied input. This vulnerability occurs due to the insecure termination of a regular expression check within the endpoint. Because the input is not correctly validated or sanitized, an unauthenticated attacker can inject arbitrary operating system commands through a crafted HTTP request, leading to remote code execution on the server in the context of the web application service account. | |
Title | MegaSys Enterprises Telenium Online Web Application OS Command Injection | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-09-30T20:41:17.681Z
Reserved: 2025-09-17T22:14:13.733Z
Link: CVE-2025-10659

Updated: 2025-09-30T20:41:14.310Z

Status : Received
Published: 2025-09-30T20:15:36.450
Modified: 2025-09-30T20:15:36.450
Link: CVE-2025-10659

No data.

Updated: 2025-10-02T08:46:08Z