Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-64130 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A Reflected XSS flaw in Zenitel TCIV-3+ IP intercoms. 🚨 **Consequences**: Attackers inject malicious JS into the victim's browser.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-79 (Improper Neutralization of Input During Web Page Generation). The device fails to sanitize user-supplied input before reflecting it back in the web interface. This allows script injection.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Product**: Zenitel TCIV-3+ IP Intercom Terminal. πŸ‡³πŸ‡΄ **Vendor**: Zenitel (Norway). πŸ“… **Published**: Nov 26, 2025. Any version of the TCIV-3+ firmware that hosts the vulnerable web interface is at risk.…

Q4What can hackers do? (Privileges/Data)

πŸ’» **Attacker Actions**: Execute arbitrary JavaScript in the victim's browser. πŸ•΅οΈ **Privileges**: No authentication required (PR:N). πŸ“Š **Data Impact**: High (C:H, I:H, A:H).…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: LOW. 🚫 **Auth**: No privileges required (PR:N). πŸ–±οΈ **UI**: No user interaction needed (UI:N). 🌐 **Network**: Remote (AV:N). πŸ“‰ **Complexity**: Low (AC:L).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: No PoC or wild exploitation detected yet (pocs: []). πŸ“ **References**: CISA Advisory ICSA-25-329-03 and Zenitel Wiki exist.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for Zenitel TCIV-3+ devices on your network. 🌐 **Test**: Look for reflected XSS in web interface parameters (URLs, forms).…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Official Fix**: Yes, patches are available. πŸ“₯ **Source**: Zenitel Downloads (Station and Device Firmware Package VS-IS). πŸ“œ **Advisory**: Refer to CISA ICSA-25-329-03 for details.…

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: If patching is delayed, restrict network access to the device's web interface. 🚫 **Isolate**: Place the device in a segmented VLAN.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. πŸ“ˆ **CVSS**: 9.8 (Critical). 🚨 **Risk**: Unauthenticated remote code execution in browser context. 🏭 **Context**: ICS/OT device. ⚑ Immediate patching is recommended.…