Vulnerability Description
A vulnerability was found in ZSPACE Z4Pro+ 1.0.0440024. Impacted is the function zfilev2_api_SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zspace | Z4Pro\+ Firmware | <= 1.0.0440024 |
| Zspace | Z4Pro\+ | - |
Related Weaknesses (CWE)
References
- https://github.com/LX-66-LX/cve/issues/1ExploitThird Party AdvisoryIssue Tracking
- https://vuldb.com/?ctiid.338509Permissions RequiredVDB Entry
- https://vuldb.com/?id.338509Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.713874Third Party AdvisoryVDB Entry
FAQ
What is CVE-2025-15131?
CVE-2025-15131 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was found in ZSPACE Z4Pro+ 1.0.0440024. Impacted is the function zfilev2_api_SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation re...
How severe is CVE-2025-15131?
CVE-2025-15131 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-15131?
Check the references section above for vendor advisories and patch information. Affected products include: Zspace Z4Pro\+ Firmware, Zspace Z4Pro\+.