CVE-2025-15131

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on ZSPACE Z4Pro+ devices through command injection in the HTTP POST request handler. Attackers can exploit this to gain unauthorized access and control over affected systems. All users running vulnerable versions of ZSPACE Z4Pro+ are affected.

💻 Affected Systems

Products:
  • ZSPACE Z4Pro+
Versions: 1.0.0440024
Operating Systems: Embedded/Linux-based system
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the HTTP POST request handler component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, install malware, pivot to other systems, and potentially disrupt operations.

🟠

Likely Case

Unauthorized command execution leading to data theft, system manipulation, or deployment of additional payloads.

🟢

If Mitigated

Limited impact if network segmentation and proper access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via HTTP POST requests, making internet-facing devices particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal devices are still vulnerable but may have additional network protections.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit has been made public and appears to be straightforward to execute based on the CWE-74 command injection pattern.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Contact ZSPACE vendor for patch information. No official patch is currently documented in available references.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the vulnerable endpoint (/v2/file/safe/status) using firewall rules or network segmentation.

Input Validation Implementation

all

Implement strict input validation and sanitization for all parameters passed to the zfilev2_api_SafeStatus function.

🧯 If You Can't Patch

  • Isolate affected devices in a separate network segment with strict access controls
  • Implement web application firewall (WAF) rules to block suspicious POST requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check device version via web interface or system information. If running version 1.0.0440024, the device is vulnerable.

Check Version:

Check device web interface or use system-specific commands to display firmware version

Verify Fix Applied:

Verify with vendor if a patched version is available and confirm the version has been updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /v2/file/safe/status with shell metacharacters
  • Unexpected command execution logs
  • Failed authentication attempts followed by command execution

Network Indicators:

  • HTTP POST requests to /v2/file/safe/status containing shell commands or special characters
  • Outbound connections from device to unexpected destinations

SIEM Query:

source="zspace_device" AND (url="/v2/file/safe/status" AND (method="POST" AND (content CONTAINS "|" OR content CONTAINS ";" OR content CONTAINS "`" OR content CONTAINS "$")))

🔗 References

📤 Share & Export