CVE-2025-15131

A vulnerability was found in ZSPACE Z4Pro+ 1.0.0440024. Impacted is the function zfilev2_api_SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
References
Link Resource
https://github.com/LX-66-LX/cve/issues/1 Exploit Third Party Advisory Issue Tracking
https://vuldb.com/?ctiid.338509 Permissions Required VDB Entry
https://vuldb.com/?id.338509 Third Party Advisory VDB Entry
https://vuldb.com/?submit.713874 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zspace:z4pro\+_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zspace:z4pro\+:-:*:*:*:*:*:*:*

History

07 Jan 2026, 21:39

Type Values Removed Values Added
First Time Zspace z4pro\+ Firmware
Zspace z4pro\+
Zspace
References () https://github.com/LX-66-LX/cve/issues/1 - () https://github.com/LX-66-LX/cve/issues/1 - Exploit, Third Party Advisory, Issue Tracking
References () https://vuldb.com/?ctiid.338509 - () https://vuldb.com/?ctiid.338509 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.338509 - () https://vuldb.com/?id.338509 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.713874 - () https://vuldb.com/?submit.713874 - Third Party Advisory, VDB Entry
CPE cpe:2.3:o:zspace:z4pro\+_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zspace:z4pro\+:-:*:*:*:*:*:*:*

28 Dec 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-28 10:15

Updated : 2026-01-07 21:39


NVD link : CVE-2025-15131

Mitre link : CVE-2025-15131

CVE.ORG link : CVE-2025-15131


JSON object : View

Products Affected

zspace

  • z4pro\+_firmware
  • z4pro\+
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')