CVE-2025-15133
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary commands on ZSPACE Z4Pro+ devices through command injection in the HTTP POST request handler. Attackers can exploit this without authentication to gain control of affected systems. Organizations using ZSPACE Z4Pro+ version 1.0.0440024 are affected.
💻 Affected Systems
- ZSPACE Z4Pro+
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to install persistent backdoors, exfiltrate sensitive data, pivot to internal networks, or deploy ransomware.
Likely Case
Attackers gain shell access to execute commands, potentially installing cryptocurrency miners, creating botnet nodes, or stealing credentials.
If Mitigated
Limited impact with proper network segmentation and monitoring, though initial compromise still possible.
🎯 Exploit Status
Exploit details are publicly available on GitHub, making this easily weaponizable by attackers with basic skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
Contact ZSPACE vendor for patch information. No official patch details are currently available from public sources.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict network access to ZSPACE Z4Pro+ devices using firewall rules
iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
Web Application Firewall
allDeploy WAF to block malicious POST requests to /v2/file/safe/close endpoint
🧯 If You Can't Patch
- Isolate affected devices in separate network segments with strict firewall rules
- Implement network monitoring and IDS/IPS to detect and block exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check device version via web interface or SSH if available. Version 1.0.0440024 is vulnerable.
Check Version:
Check web interface or contact vendor for version verification method
Verify Fix Applied:
Test with controlled exploit attempt or verify updated version from vendor.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /v2/file/safe/close
- Commands containing shell metacharacters in HTTP requests
- Unexpected process execution from web service
Network Indicators:
- POST requests to /v2/file/safe/close with shell commands in parameters
- Outbound connections from device to unknown IPs
SIEM Query:
source="zspace_logs" AND (uri="/v2/file/safe/close" AND (method="POST" AND (param="*;*" OR param="*|*" OR param="*`*")))