A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-FindFileBySizeAndHash instruction prior V21.1. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
References
| Link | Resource |
|---|---|
| https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ | Vendor Advisory |
Configurations
History
14 Jan 2026, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ - Vendor Advisory | |
| CWE | NVD-CWE-noinfo | |
| First Time |
Teamviewer
Teamviewer digital Employee Experience |
|
| CPE | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* |
11 Dec 2025, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 12:16
Updated : 2026-01-14 20:17
NVD link : CVE-2025-64989
Mitre link : CVE-2025-64989
CVE.ORG link : CVE-2025-64989
JSON object : View
Products Affected
teamviewer
- digital_employee_experience
CWE
