Telenium Online Web Application is vulnerable due to a Perl script that
is called to load the login page. Due to improper input validation, an
attacker can inject arbitrary Perl code through a crafted HTTP request,
leading to remote code execution on the server.

Project Subscriptions

Vendors Products
Megasys Subscribe
Telenium Online Web Application Subscribe
Advisories

No advisories yet.

Fixes

Solution

MegaSys Computer technologies released the following patches: * Telenium Online Web Application: v7.4.72 * Telenium Online Web Application: v8.3.36 If users are unable to promptly install the patched versions addressing the vulnerability, MegaSys Computer Technologies recommends mitigating the risk by disabling the web/browser-based interface. For additional information or assistance, contact MegaSys Computer Technologies support https://megasys.com/support/ directly.


Workaround

No workaround given by the vendor.

History

Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Megasys
Megasys telenium Online Web Application
Vendors & Products Megasys
Megasys telenium Online Web Application

Wed, 24 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 20:30:00 +0000

Type Values Removed Values Added
Description Telenium Online Web Application is vulnerable due to a Perl script that is called to load the login page. Due to improper input validation, an attacker can inject arbitrary Perl code through a crafted HTTP request, leading to remote code execution on the server.
Title MegaSys Computer Technologies Telenium Online Web Application Improper Input Validation
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-12-24T20:36:42.847Z

Reserved: 2025-08-08T19:27:48.789Z

Link: CVE-2025-8769

cve-icon Vulnrichment

Updated: 2025-12-24T20:33:07.078Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-24T21:16:04.710

Modified: 2025-12-29T15:58:13.147

Link: CVE-2025-8769

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-05T10:23:36Z

Weaknesses