
CVE-2025-34093 – Polycom HDX Series Telnet Command Injection via lan traceroute
https://notcve.org/view.php?id=CVE-2025-34093
10 Jul 2025 — An authenticated command injection vulnerability exists in the Polycom HDX Series command shell interface accessible over Telnet. The lan traceroute command in the devcmds console accepts unsanitized input, allowing attackers to execute arbitrary system commands. By injecting shell metacharacters through the traceroute interface, an attacker can achieve remote code execution under the context of the root user. This flaw affects systems where Telnet access is enabled and either unauthenticated access is allo... • https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/misc/polycom_hdx_traceroute_exec.rb • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-11355
https://notcve.org/view.php?id=CVE-2019-11355
12 Mar 2020 — An issue was discovered in Poly (formerly Polycom) HDX 3.1.13. A feature exists that allows the creation of a server / client certificate, or the upload of the user certificate, on the administrator's page. The value received from the user is the factor value of a shell script on the equipment. By entering a special character (such as a single quote) in a CN or other CSR field, one can insert a command into a factor value. A system command can be executed as root. • https://support.polycom.com/content/dam/polycom-support/global/documentation/hdx-3-1-14-advisory.pdf • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2012-6611
https://notcve.org/view.php?id=CVE-2012-6611
10 Feb 2020 — An issue was discovered in Polycom Web Management Interface G3/HDX 8000 HD with Durango 2.6.0 4740 software and embedded Polycom Linux Development Platform 2.14.g3. It has a blank administrative password by default, and can be successfully used without setting this password. Se detectó un problema en Polycom Web Management Interface G3/HDX 8000 HD con el software Durango versión 2.6.0 4740 y la plataforma de desarrollo Polycom Linux 2.14.g3 integrada. Tiene una contraseña administrativa en blanco de forma p... • https://web.archive.org/web/20130320033016/http://blog.tempest.com.br/joao-paulo-campello/path-traversal-on-polycom-web-management-interface.html • CWE-798: Use of Hard-coded Credentials •

CVE-2012-6609
https://notcve.org/view.php?id=CVE-2012-6609
28 Jan 2020 — Directory traversal vulnerability in a_getlog.cgi in Polycom HDX Video End Points before 3.0.4 and UC APL before 2.7.1.J allows remote attackers to read arbitrary files via a .. (dot dot) in the name parameter. Una vulnerabilidad salto de directorio en el archivo a_getlog.cgi en Polycom HDX Video End Points versiones anteriores a 3.0.4 y UC APL versiones anteriores a 2.7.1.J, permite a atacantes remotos leer archivos arbitrarios por medio de un carácter ".." (punto punto) en el parámetro name. • http://seclists.org/fulldisclosure/2012/Mar/18 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2012-6610
https://notcve.org/view.php?id=CVE-2012-6610
28 Jan 2020 — Polycom HDX Video End Points before 3.0.4 and UC APL before 2.7.1.J allows remote authenticated users to execute arbitrary commands as demonstrated by a ; (semicolon) to the ping command feature. Polycom HDX Video End Points versiones anteriores a 3.0.4 y UC APL versiones anteriores a 2.7.1.J, permiten a usuarios autenticados remotos ejecutar comandos arbitrarios como es demostrado por un carácter ";" (punto y coma) en la funcionalidad ping command. • http://seclists.org/fulldisclosure/2012/Mar/18 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-14259
https://notcve.org/view.php?id=CVE-2019-14259
01 Aug 2019 — On the Polycom Obihai Obi1022 VoIP phone with firmware 5.1.11, a command injection (missing input validation) issue in the NTP server IP address field for the "Time Service Settings web" interface allows an authenticated remote attacker in the same network to trigger OS commands via shell commands in a POST request. En el teléfono Obihai Obi1022 VoIP de Polycom con la versión firmware 5.1.11, un problema de inyección de comandos (falta de comprobación de entrada) en el campo dirección IP del servidor NTP pa... • https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Obihai_Obi1002.pdf?_=1563787869 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-12948
https://notcve.org/view.php?id=CVE-2019-12948
29 Jul 2019 — A vulnerability in the web-based management interface of VVX, Trio, SoundStructure, SoundPoint, and SoundStation phones running Polycom UC Software, if exploited, could allow an authenticated, remote attacker with admin privileges to cause a denial of service (DoS) condition or execute arbitrary code. Una vulnerabilidad en la interfaz de administración basada en web de los teléfonos VVX, Trio, SoundStructure, SoundPoint y SoundStation que ejecutan el software Polycom UC, si se explota, podría permitir que u... • https://support.polycom.com/content/dam/polycom-support/global/documentation/remote-code-execution-vulnerability-in-ucs-software-v1-1.pdf • CWE-749: Exposed Dangerous Method or Function •

CVE-2019-10689
https://notcve.org/view.php?id=CVE-2019-10689
24 Jun 2019 — VVX products using UCS software version 5.9.2 and earlier with Better Together over Ethernet Connector (BToE) application version 3.9.1 and earlier provides insufficient authentication between the BToE application and the BToE component, resulting in leakage of sensitive information. Los productos VVX que utiliza el software UCS versión 5.9.2 y anteriores, con la aplicación Better Together over Ethernet Connector (BToE) versión 3.9.1 y anteriores, proporcionan una autenticación insuficiente entre la aplicac... • http://www.securityfocus.com/bid/108799 • CWE-287: Improper Authentication •

CVE-2018-10947
https://notcve.org/view.php?id=CVE-2018-10947
13 Jun 2019 — An issue was discovered in versions earlier than 1.3.2 for Polycom RealPresence Debut where the admin cookie is reset only after a Debut is rebooted. Se descubrió un problema en las versiones anteriores 1.3.2 para Polycom RealPresence Debut donde la cookie de el administrador se restablece solamente después de reiniciar un Debut • https://support.polycom.com/PolycomService/home/home.htm • CWE-20: Improper Input Validation •

CVE-2018-10946
https://notcve.org/view.php?id=CVE-2018-10946
13 Jun 2019 — An issue was discovered in versions earlier than 1.3.0-66872 for Polycom RealPresence Debut that allows attackers to arbitrarily read the admin user's password via the admin web UI. Se descubrió un problema en las versiones mucho más anteriores que 1.3.0-66872 para Polycom RealPresence Debut, esto permite a los atacantes leer arbitrariamente la contraseña del usuario administrador a través de la web de administración • https://support.polycom.com/PolycomService/home/home.htm • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •