An unauthenticated debug port may allow access to the device file system.
Fixes

Solution

No solution given by the vendor.


Workaround

Raise3D confirmed this vulnerability exists in the Pro2 Series devices when developer mode is enabled. Raise3D is developing a patched version of the printer firmware; however, no release date has yet been provided. Raise3D recommends disabling developer mode if it is not required. Further information is available from Raise3D at the Raise3D Support Center https://support.raise3d.com/  .

History

Thu, 02 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Description An unauthenticated debug port may allow access to the device file system.
Title Raise3D Pro2 Series 3D Printers Authentication Bypass Using an Alternate Path or Channel
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-10-02T20:27:45.612Z

Reserved: 2025-09-17T19:22:05.886Z

Link: CVE-2025-10653

cve-icon Vulnrichment

Updated: 2025-10-02T20:26:37.839Z

cve-icon NVD

Status : Received

Published: 2025-10-02T20:15:31.507

Modified: 2025-10-02T20:15:31.507

Link: CVE-2025-10653

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.