Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

icx510

Source -

NVD

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

2
Related CVEsRelated VendorsRelated AssignersReports
2Vulnerabilities found

CVE-2025-64093
Assigner-National Cyber Security Centre Netherlands (NCSC-NL)
ShareView Details
Assigner-National Cyber Security Centre Netherlands (NCSC-NL)
CVSS Score-10||CRITICAL
EPSS-0.32% / 54.66%
||
7 Day CHG+0.03%
Published-09 Jan, 2026 | 10:04
Updated-10 Feb, 2026 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Remote Code Execution via the device hostname

Remote Code Execution vulnerability that allows unauthenticated attackers to inject arbitrary commands into the hostname of the device.

Action-Not Available
Vendor-zenitelZenitel
Product-icx500icx510icx500_firmwareicx510_firmwareICX510ICX500
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2025-64092
Assigner-National Cyber Security Centre Netherlands (NCSC-NL)
ShareView Details
Assigner-National Cyber Security Centre Netherlands (NCSC-NL)
CVSS Score-7.5||HIGH
EPSS-0.09% / 24.85%
||
7 Day CHG+0.01%
Published-09 Jan, 2026 | 10:03
Updated-12 Feb, 2026 | 17:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated SQL injection via GET request parameters

This vulnerability allows unauthenticated attackers to inject an SQL request into GET request parameters and directly query the underlying database.

Action-Not Available
Vendor-zenitelZenitel
Product-icx500icx510icx500_firmwareicx510_firmwareICX510ICX500
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')