CVE-2025-64987
BaseFortify
Publication date: 2025-12-11
Last updated on: 2025-12-11
Assigner: TeamViewer Germany GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| teamviewer | teamviewer_dex | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a command injection flaw in TeamViewer DEX, specifically in the 1E-Explorer-TachyonCore-CheckSimpleIoC instruction. It occurs due to improper input validation, allowing authenticated users with Actioner privileges to inject arbitrary commands. This enables them to execute elevated commands remotely on devices connected to the platform.
How can this vulnerability impact me? :
The vulnerability can allow an attacker with Actioner privileges to remotely execute elevated commands on connected devices, potentially leading to unauthorized control, data compromise, or disruption of services.