Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 28 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in ZSPACE Z4Pro+ 1.0.0440024. Impacted is the function zfilev2_api_SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure. | |
| Title | ZSPACE Z4Pro+ HTTP POST Request status zfilev2_api_SafeStatus command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-28T10:02:06.337Z
Reserved: 2025-12-27T09:36:42.617Z
Link: CVE-2025-15131
No data.
Status : Received
Published: 2025-12-28T10:15:41.110
Modified: 2025-12-28T10:15:41.110
Link: CVE-2025-15131
No data.
OpenCVE Enrichment
No data.