๐Ÿ” CVE Alert

CVE-2025-34093

UNKNOWN 0.0

Polycom HDX Series Telnet Command Injection via lan traceroute

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An authenticated command injection vulnerability exists in the Polycom HDX Series command shell interface accessible over Telnet. The lan traceroute command in the devcmds console accepts unsanitized input, allowing attackers to execute arbitrary system commands. By injecting shell metacharacters through the traceroute interface, an attacker can achieve remote code execution under the context of the root user. This flaw affects systems where Telnet access is enabled and either unauthenticated access is allowed or credentials are known.

CWE CWE-78
Vendor polycom
Product hdx series
Published Jul 10, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for polycom hdx series

Be the first to know when new unknown vulnerabilities affecting polycom hdx series are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Polycom / HDX Series
0 < 3.1.11 hotfix 2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/misc/polycom_hdx_traceroute_exec.rb staaldraad.github.io: https://staaldraad.github.io/2017/11/12/polycom-hdx-rce/ web.archive.org: https://web.archive.org/web/20200312205144/http://support.polycom.com/content/dam/polycom-support/global/documentation/securityadvisory-remotecodeexecutionon-hdx-v0.3-hotfix-release.pdf exploit-db.com: https://www.exploit-db.com/exploits/24494 vulncheck.com: https://vulncheck.com/advisories/polycom-hdx-series-telnet-rce

Credits

Etienne Stalmans of Staaldraad