Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14105: Denial of Service in TOZED ZLT M30S

0
Medium
VulnerabilityCVE-2025-14105cvecve-2025-14105
Published: Fri Dec 05 2025 (12/05/2025, 21:02:06 UTC)
Source: CVE Database V5
Vendor/Project: TOZED
Product: ZLT M30S

Description

CVE-2025-14105 is a medium-severity denial of service vulnerability affecting TOZED ZLT M30S and ZLT M30S PRO devices running firmware versions 1. 47 and 3. 09. 06. The flaw exists in the web interface component, specifically in the /reqproc/proc_post function, where manipulation of the 'goformId' argument with the input 'REBOOT_DEVICE' can cause the device to become unavailable. Exploitation requires local network access, does not require authentication or user interaction, and can be performed remotely within the LAN. The vendor has not responded to disclosure attempts, and no patches are currently available. Although no known exploits are in the wild, the vulnerability has been publicly disclosed and could be leveraged to disrupt network availability. European organizations using these devices in their local networks may face service interruptions impacting operational continuity. Mitigation involves network segmentation, restricting local network access to trusted users, monitoring for suspicious POST requests targeting 'goformId', and considering device replacement or firmware updates if available.

AI-Powered Analysis

AILast updated: 12/12/2025, 22:33:32 UTC

Technical Analysis

CVE-2025-14105 identifies a denial of service (DoS) vulnerability in the TOZED ZLT M30S and ZLT M30S PRO routers, specifically affecting firmware versions 1.47 and 3.09.06. The vulnerability resides in the web interface component, within the /reqproc/proc_post handler. An attacker can send a crafted HTTP POST request manipulating the 'goformId' parameter with the value 'REBOOT_DEVICE', triggering a reboot or crash condition that results in denial of service. The attack vector is limited to the local network (AV:A), requiring no privileges (PR:N), no authentication (AT:N), and no user interaction (UI:N). The vulnerability impacts availability (VA:L) but does not affect confidentiality or integrity. The vendor was notified but has not issued a patch or response, leaving devices exposed. Although exploitation requires local network access, the publicly disclosed exploit details increase the risk of attacks by insiders or compromised hosts within the LAN. The lack of authentication on the web interface exacerbates the risk. The CVSS 4.0 score of 5.3 reflects a medium severity, balancing the limited attack surface with the ease of exploitation and impact on device availability. No known exploits are currently active in the wild, but the vulnerability could be leveraged to disrupt network operations, especially in environments relying on these devices for critical connectivity.

Potential Impact

For European organizations, the primary impact is disruption of network availability due to forced device reboots or crashes, potentially causing downtime in local network segments. This can affect business continuity, especially in environments where TOZED ZLT M30S devices serve as critical network infrastructure components such as in small to medium enterprises, branch offices, or industrial control systems. The requirement for local network access limits remote exploitation but raises concerns about insider threats or malware propagation within internal networks. Unavailability of these devices could interrupt internet access, intranet services, or connectivity to operational technology systems, leading to productivity losses and potential safety risks in industrial settings. The absence of vendor patches prolongs exposure, increasing the window for exploitation. Additionally, the public disclosure of the vulnerability and exploit details may encourage attackers to target vulnerable networks, particularly in sectors with less mature network segmentation and monitoring practices.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement strict network segmentation to isolate TOZED ZLT M30S devices from untrusted or general user segments, limiting access to the local network where these devices reside. Access controls should be enforced to restrict who can send HTTP POST requests to the device's web interface, ideally allowing only trusted administrators or management systems. Monitoring network traffic for suspicious POST requests containing 'goformId=REBOOT_DEVICE' can provide early detection of exploitation attempts. If possible, disable or restrict the web interface access to management VLANs or via secure management channels such as VPNs. Organizations should also consider replacing affected devices with alternative hardware from vendors with active security support if firmware updates or patches remain unavailable. Regular network device inventory and firmware version audits will help identify vulnerable devices. Finally, educating internal users about the risks of local network attacks and maintaining strong endpoint security can reduce the risk of insider or malware-driven exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-05T14:38:45.603Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69334b6ff88dbe026c1e4442

Added to database: 12/5/2025, 9:15:27 PM

Last enriched: 12/12/2025, 10:33:32 PM

Last updated: 1/20/2026, 5:31:51 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats