Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 05 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in TOZED ZLT M30S and ZLT M30S PRO 1.47/3.09.06. This impacts an unknown function of the file /reqproc/proc_post of the component Web Interface. Executing manipulation of the argument goformId with the input REBOOT_DEVICE can lead to denial of service. The attack can only be done within the local network. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | TOZED ZLT M30S/ZLT M30S PRO Web proc_post denial of service | |
| Weaknesses | CWE-404 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-05T21:48:07.945Z
Reserved: 2025-12-05T14:38:45.603Z
Link: CVE-2025-14105
No data.
Status : Received
Published: 2025-12-05T21:15:53.120
Modified: 2025-12-05T21:15:53.120
Link: CVE-2025-14105
No data.
OpenCVE Enrichment
No data.