A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-DevicesListeningOnAPort instruction prior V21. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
References
| Link | Resource |
|---|---|
| https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ | Vendor Advisory |
Configurations
History
14 Jan 2026, 20:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ - Vendor Advisory | |
| CWE | CWE-77 | |
| CPE | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* | |
| First Time |
Teamviewer
Teamviewer digital Employee Experience |
11 Dec 2025, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 12:16
Updated : 2026-01-14 20:00
NVD link : CVE-2025-64986
Mitre link : CVE-2025-64986
CVE.ORG link : CVE-2025-64986
JSON object : View
Products Affected
teamviewer
- digital_employee_experience
