A vulnerability was found in ZSPACE Z4Pro+ 1.0.0440024. Impacted is the function zfilev2_api_SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
Metrics
Affected Vendors & Products
References
History
Sun, 28 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in ZSPACE Z4Pro+ 1.0.0440024. Impacted is the function zfilev2_api_SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure. | |
| Title | ZSPACE Z4Pro+ HTTP POST Request status zfilev2_api_SafeStatus command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-12-28T10:02:06.337Z
Updated: 2025-12-28T10:02:06.337Z
Reserved: 2025-12-27T09:36:42.617Z
Link: CVE-2025-15131
No data.
Status : Received
Published: 2025-12-28T10:15:41.110
Modified: 2025-12-28T10:15:41.110
Link: CVE-2025-15131
No data.