Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 26 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 26 Sep 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zeromq
Zeromq zeromq |
|
Vendors & Products |
Zeromq
Zeromq zeromq |
Thu, 25 Sep 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in GuanxingLu vlarl up to 31abc0baf53ef8f5db666a1c882e1ea64def2997. This vulnerability affects the function experiments.robot.bridge.reasoning_server::run_reasoning_server of the file experiments/robot/bridge/reasoning_server.py of the component ZeroMQ. Performing manipulation of the argument Message results in deserialization. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. | |
Title | GuanxingLu vlarl ZeroMQ reasoning_server.py run_reasoning_server deserialization | |
Weaknesses | CWE-20 CWE-502 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-26T17:53:07.057Z
Reserved: 2025-09-25T14:12:06.699Z
Link: CVE-2025-10975

Updated: 2025-09-26T17:36:57.686Z

Status : Awaiting Analysis
Published: 2025-09-25T22:15:34.503
Modified: 2025-09-26T18:15:34.160
Link: CVE-2025-10975

No data.

Updated: 2025-09-26T11:35:29Z