Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-32203 | An unauthenticated debug port may allow access to the device file system. |
Solution
No solution given by the vendor.
Workaround
Raise3D confirmed this vulnerability exists in the Pro2 Series devices when developer mode is enabled. Raise3D is developing a patched version of the printer firmware; however, no release date has yet been provided. Raise3D recommends disabling developer mode if it is not required. Further information is available from Raise3D at the Raise3D Support Center https://support.raise3d.com/ .
Fri, 03 Oct 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raise3d
Raise3d pro2 Series |
|
| Vendors & Products |
Raise3d
Raise3d pro2 Series |
Thu, 02 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated debug port may allow access to the device file system. | |
| Title | Raise3D Pro2 Series 3D Printers Authentication Bypass Using an Alternate Path or Channel | |
| Weaknesses | CWE-288 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-10-02T20:27:45.612Z
Reserved: 2025-09-17T19:22:05.886Z
Link: CVE-2025-10653
Updated: 2025-10-02T20:26:37.839Z
Status : Awaiting Analysis
Published: 2025-10-02T20:15:31.507
Modified: 2025-10-06T14:57:05.000
Link: CVE-2025-10653
No data.
OpenCVE Enrichment
Updated: 2025-10-03T08:22:30Z
EUVD