CVE-2025-34093
Polycom HDX Series Telnet Command Injection via lan traceroute
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
An authenticated command injection vulnerability exists in the Polycom HDX Series command shell interface accessible over Telnet. The lan traceroute command in the devcmds console accepts unsanitized input, allowing attackers to execute arbitrary system commands. By injecting shell metacharacters through the traceroute interface, an attacker can achieve remote code execution under the context of the root user. This flaw affects systems where Telnet access is enabled and either unauthenticated access is allowed or credentials are known.
| CWE | CWE-78 |
| Vendor | polycom |
| Product | hdx series |
| Published | Jul 10, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for polycom hdx series
Be the first to know when new unknown vulnerabilities affecting polycom hdx series are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Polycom / HDX Series
0 < 3.1.11 hotfix 2
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/misc/polycom_hdx_traceroute_exec.rb staaldraad.github.io: https://staaldraad.github.io/2017/11/12/polycom-hdx-rce/ web.archive.org: https://web.archive.org/web/20200312205144/http://support.polycom.com/content/dam/polycom-support/global/documentation/securityadvisory-remotecodeexecutionon-hdx-v0.3-hotfix-release.pdf exploit-db.com: https://www.exploit-db.com/exploits/24494 vulncheck.com: https://vulncheck.com/advisories/polycom-hdx-series-telnet-rce
Credits
Etienne Stalmans of Staaldraad