Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Raise3D confirmed this vulnerability exists in the Pro2 Series devices when developer mode is enabled. Raise3D is developing a patched version of the printer firmware; however, no release date has yet been provided. Raise3D recommends disabling developer mode if it is not required. Further information is available from Raise3D at the Raise3D Support Center https://support.raise3d.com/ .
Thu, 02 Oct 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 02 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated debug port may allow access to the device file system. | |
Title | Raise3D Pro2 Series 3D Printers Authentication Bypass Using an Alternate Path or Channel | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-10-02T20:27:45.612Z
Reserved: 2025-09-17T19:22:05.886Z
Link: CVE-2025-10653

Updated: 2025-10-02T20:26:37.839Z

Status : Received
Published: 2025-10-02T20:15:31.507
Modified: 2025-10-02T20:15:31.507
Link: CVE-2025-10653

No data.

No data.