A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-LogoffUser instruction prior V21.1. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
References
| Link | Resource |
|---|---|
| https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ | Vendor Advisory |
Configurations
History
14 Jan 2026, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| First Time |
Teamviewer
Teamviewer digital Employee Experience |
|
| References | () https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ - Vendor Advisory |
11 Dec 2025, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 12:16
Updated : 2026-01-14 20:18
NVD link : CVE-2025-64990
Mitre link : CVE-2025-64990
CVE.ORG link : CVE-2025-64990
JSON object : View
Products Affected
teamviewer
- digital_employee_experience
CWE
