CVE-2025-15133

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on ZSPACE Z4Pro+ devices through command injection in the HTTP POST request handler. Attackers can exploit this without authentication to gain control of affected systems. Organizations using ZSPACE Z4Pro+ version 1.0.0440024 are affected.

💻 Affected Systems

Products:
  • ZSPACE Z4Pro+
Versions: 1.0.0440024
Operating Systems: Embedded/Linux-based system
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the HTTP POST request handler component specifically at /v2/file/safe/close endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent backdoors, exfiltrate sensitive data, pivot to internal networks, or deploy ransomware.

🟠

Likely Case

Attackers gain shell access to execute commands, potentially installing cryptocurrency miners, creating botnet nodes, or stealing credentials.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though initial compromise still possible.

🌐 Internet-Facing: HIGH - Attack can be launched remotely without authentication, and exploit is publicly available.
🏢 Internal Only: MEDIUM - Still vulnerable to internal threats but attack surface reduced compared to internet exposure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily weaponizable by attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Contact ZSPACE vendor for patch information. No official patch details are currently available from public sources.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict network access to ZSPACE Z4Pro+ devices using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Web Application Firewall

all

Deploy WAF to block malicious POST requests to /v2/file/safe/close endpoint

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments with strict firewall rules
  • Implement network monitoring and IDS/IPS to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check device version via web interface or SSH if available. Version 1.0.0440024 is vulnerable.

Check Version:

Check web interface or contact vendor for version verification method

Verify Fix Applied:

Test with controlled exploit attempt or verify updated version from vendor.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /v2/file/safe/close
  • Commands containing shell metacharacters in HTTP requests
  • Unexpected process execution from web service

Network Indicators:

  • POST requests to /v2/file/safe/close with shell commands in parameters
  • Outbound connections from device to unknown IPs

SIEM Query:

source="zspace_logs" AND (uri="/v2/file/safe/close" AND (method="POST" AND (param="*;*" OR param="*|*" OR param="*`*")))

🔗 References

📤 Share & Export