CVE-2025-34093

HIGH

Polycom HDX Series - Command Injection

Title source: llm

Description

An authenticated command injection vulnerability exists in the Polycom HDX Series command shell interface accessible over Telnet. The lan traceroute command in the devcmds console accepts unsanitized input, allowing attackers to execute arbitrary system commands. By injecting shell metacharacters through the traceroute interface, an attacker can achieve remote code execution under the context of the root user. This flaw affects systems where Telnet access is enabled and either unauthenticated access is allowed or credentials are known.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Paul Haas · rubyremotehardware
https://www.exploit-db.com/exploits/24494
metasploit WORKING POC EXCELLENT
by Mumbai, staaldraad · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/misc/polycom_hdx_traceroute_exec.rb

Scores

CVSS v4 7.5
EPSS 0.5079
EPSS Percentile 97.9%
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Details

CWE
CWE-78
Status published
Products (1)
Polycom/HDX Series < 3.1.11 hotfix 2
Published Jul 10, 2025
Tracked Since Feb 18, 2026