CVE-2025-10659 PUBLISHED

MegaSys Enterprises Telenium Online Web Application OS Command Injection

Assigner: icscert
Reserved: 17.09.2025 Published: 30.09.2025 Updated: 30.09.2025

The Telenium Online Web Application is vulnerable due to a PHP endpoint accessible to unauthenticated network users that improperly handles user-supplied input. This vulnerability occurs due to the insecure termination of a regular expression check within the endpoint. Because the input is not correctly validated or sanitized, an unauthenticated attacker can inject arbitrary operating system commands through a crafted HTTP request, leading to remote code execution on the server in the context of the web application service account.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor MegaSys
Product Telenium Online Web Application:
Versions Default: unaffected
  • affected from 0 to 8.4.21 (incl.)

Solutions

Megasys Enterprises has provided a fix for this vulnerability. Users should access the Megasys support page https://support.portal.megasys.com/  to get instructions on applying the fix.

Credits

  • Scott Sheach reported this vulnerability to MegaSys Enterprises. finder

References

Problem Types

  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE