A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-RunPkgStatusRequest instruction. Improper input validation allows authenticated attackers with actioner privilege to run elevated arbitrary commands on connected hosts via malicious commands injected into the instruction’s input field. Users of 1E Client version 24.5 or higher are not affected.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
Update the TeamViewer DEX Client (1E Client) to the latest available version. Remove the instruction 1E-Nomad-RunPkgStatusRequest from DEX Portal.
Workaround
No workaround given by the vendor.
References
History
Thu, 29 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-RunPkgStatusRequest instruction. Improper input validation allows authenticated attackers with actioner privilege to run elevated arbitrary commands on connected hosts via malicious commands injected into the instruction’s input field. Users of 1E Client version 24.5 or higher are not affected. | |
| Title | Command Injection in 1E-Nomad-RunPkgStatusRequest Instruction in TeamViewer DEX | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2026-01-29T08:41:45.941Z
Reserved: 2026-01-14T13:54:40.322Z
Link: CVE-2026-23571
No data.
Status : Received
Published: 2026-01-29T09:16:04.867
Modified: 2026-01-29T09:16:04.867
Link: CVE-2026-23571
No data.
OpenCVE Enrichment
No data.
Weaknesses