Skip to main

Remote Code Execution in Telex RDC Server and RTS VLink Virtual Matrix

BOSCH-SA-992447-BT

Advisory Information

Summary

A security vulnerability has been uncovered in the REST API of the Telex Remote Dispatch Console Server and the RTS VLink Virtual Matrix Software. The vulnerability will allow a Remote Code Execution (RCE) attack.

All versions < 1.3.0 of the Telex Remote Dispatch Console Server are affected by this vulnerability.

Versions v5 and v6 (< 6.6.0) of the RTS VLink Virtual Matrix Software are affected by this vulnerability. Older versions (v4 and lower) are not affected.

The vulnerability has been uncovered and disclosed responsibly by external researcher Omer Shaik.

Affected Products

  • RTS VLink Virtual Matrix Software on: Windows
    • CVE-2025-29902
      • Version(s): 5
      • Version(s): 6.0.0 - 6.6.0 (excluding)
  • Telex Remote Dispatch Console Server on: Windows
    • CVE-2025-29902
      • Version(s): 1.0.0 - 1.3.0 (excluding)

Solution and Mitigations

Solution

Update the Telex Remote Dispatch Console Server to version 1.3.0.

Update the VLink Virtual Matrix Software to version 6.6.0 if you are currently using a v6 version.

Upgrade the VLink Virtual Matrix Software to v6 (specifically to version 6.6.0) if you are currently using a v5 version.

To ensure the security of your system, we strongly recommend that you update your software to the latest version. Instructions for downloading and updating your system may be found at https://products.rtsintercoms.com/binary/VLink_Upgrade_Instructions.pdf

Mitigation

Blocking the web interface ports (80 and 443) of the RTS VLink Virtual Matrix Software or the Telex RDC Server in a firewall will prevent the vulnerability from being misused from a remote location.

In all cases it is still strongly advised to perform the update as soon as possible since that will remove the vulnerability.

Vulnerability Details

CVE-2025-29902

CVE description: Remote code execution that allows unauthorized users to execute arbitrary code on the server machine.

Remarks

Security Update Information

With respect to Directive (EU) 2019/770 and Directive (EU) 2019/771 and their national transposition laws, please note:

It is your responsibility to download and/or install any security updates provided by us, for example to maintain product or data security. If you fail to install a security update provided to you within a reasonable period of time, we will not be liable for any product defect solely due to the absence of such security update.

Alternatively, we are entitled to directly download and/or install security updates regardless of your settings. In these cases, we will provide you with the relevant information, e.g. in this security advisory.

CVSS Scoring

Vulnerability classification has been performed using the CVSS v3.1 scoring system . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.

Additional Resources

Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: psirt@bosch.com .

Revision History

  • 10 Jun 2025: Initial Publication

Appendix

Material List

Please find the SAP Number and CTN of the affected products below.

SAP Number CTN
F.01U.216.945
VLINK-8
F.01U.216.946
VLINK-8UPG
F.01U.216.947
VLINK-LE-2EXP
F.01U.264.751
VLINK-2EXP
F.01U.264.752
VLINK-LE-2EXP
F.01U.285.467
Vlink 1 seat license for VCOM
F.01U.388.141
VLINK-8REDNT
F.01U.388.142
VLINK-1RENTAL
F.01U.388.143
VLINK-2REDNT
F.01U.388.144
VLINK-8SIP
F.01U.388.145
VLINK-2SIP
F.01U.388.146
VLINK-8SIPREDNT
F.01U.388.148
VLINK-2SIPREDNT
F.01U.393.239
VLINK-SVU
F.01U.393.240
VLINK-Lite
F.01U.393.241
VLINK-LiteUPG
F.01U.393.242
VLINK-VIDEO
F.01U.393.243
VLINK-VIDEO I/O
F.01U.393.244
VLINK-REC
F.01U.393.245
VLINK-ENCRYPT
F.01U.396.977
VLINK-8 SPACE
F.01U.396.978
VLINK-2 EXSPACE
F.01U.394.128
RDC-SYS01-A
F.01U.394.129
RDC-CON10-A
F.01U.394.130
RDC-TG02-A
F.01U.413.775
RDC-CON05-A