CVE-2025-59818
Published: 04 February 2026
Description
This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates command injection by validating filenames of uploaded files to reject malicious payloads containing shell metacharacters.
Ensures timely remediation of the specific command injection flaw through patching to version 9.3 as recommended by the vendor.
Restricts filenames at file upload boundaries to safe character sets or patterns, blocking injection attempts via disallowed metacharacters.
Security SummaryAI
CVE-2025-59818 is a command injection vulnerability (CWE-77) that enables authenticated attackers to execute arbitrary commands on the underlying system by manipulating the filename of an uploaded file. It affects Zenitel communication systems, including Turbine, VSF-Display Series, VSF-Fortitude6, VSF-Fortitude8, and ZIPS prior to version 9.3. The vulnerability carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity with network accessibility, low attack complexity, no user interaction required, and full impacts on confidentiality, integrity, and availability in a changed scope.
An authenticated attacker, despite the CVSS indicating no privileges required (PR:N), can exploit this flaw by uploading a specially crafted file whose filename injects and executes arbitrary operating system commands. Successful exploitation grants remote code execution on the affected device, potentially leading to complete system compromise, data exfiltration, or further lateral movement within the network.
Zenitel's release notes for version 9.3 across the affected products—Turbine, VSF-Display Series, VSF-Fortitude6, VSF-Fortitude8, and ZIPS—address this vulnerability, recommending upgrade to the patched 9.3 release as the primary mitigation. No additional workarounds are detailed in the provided references.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection via manipulated filename in file upload feature of network-accessible communication systems enables exploitation of public-facing applications (T1190) and remote services (T1210), directly facilitating arbitrary command execution (T1059).