CVE-2025-34093
HIGHPolycom HDX Series - Command Injection
Title source: llmDescription
An authenticated command injection vulnerability exists in the Polycom HDX Series command shell interface accessible over Telnet. The lan traceroute command in the devcmds console accepts unsanitized input, allowing attackers to execute arbitrary system commands. By injecting shell metacharacters through the traceroute interface, an attacker can achieve remote code execution under the context of the root user. This flaw affects systems where Telnet access is enabled and either unauthenticated access is allowed or credentials are known.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Paul Haas · rubyremotehardware
https://www.exploit-db.com/exploits/24494
metasploit
WORKING POC
EXCELLENT
by Mumbai, staaldraad · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/misc/polycom_hdx_traceroute_exec.rb
References (5)
Scores
CVSS v4
7.5
EPSS
0.5079
EPSS Percentile
97.9%
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Details
CWE
CWE-78
Status
published
Products (1)
Polycom/HDX Series
< 3.1.11 hotfix 2
Published
Jul 10, 2025
Tracked Since
Feb 18, 2026