CVE-2025-14105: Denial of Service in TOZED ZLT M30S
CVE-2025-14105 is a medium-severity denial of service vulnerability affecting TOZED ZLT M30S and ZLT M30S PRO devices running firmware versions 1. 47 and 3. 09. 06. The flaw exists in the web interface component, specifically in the /reqproc/proc_post function, where manipulation of the 'goformId' argument with the input 'REBOOT_DEVICE' can cause the device to become unavailable. Exploitation requires local network access, does not require authentication or user interaction, and can be performed remotely within the LAN. The vendor has not responded to disclosure attempts, and no patches are currently available. Although no known exploits are in the wild, the vulnerability has been publicly disclosed and could be leveraged to disrupt network availability. European organizations using these devices in their local networks may face service interruptions impacting operational continuity. Mitigation involves network segmentation, restricting local network access to trusted users, monitoring for suspicious POST requests targeting 'goformId', and considering device replacement or firmware updates if available.
AI Analysis
Technical Summary
CVE-2025-14105 identifies a denial of service (DoS) vulnerability in the TOZED ZLT M30S and ZLT M30S PRO routers, specifically affecting firmware versions 1.47 and 3.09.06. The vulnerability resides in the web interface component, within the /reqproc/proc_post handler. An attacker can send a crafted HTTP POST request manipulating the 'goformId' parameter with the value 'REBOOT_DEVICE', triggering a reboot or crash condition that results in denial of service. The attack vector is limited to the local network (AV:A), requiring no privileges (PR:N), no authentication (AT:N), and no user interaction (UI:N). The vulnerability impacts availability (VA:L) but does not affect confidentiality or integrity. The vendor was notified but has not issued a patch or response, leaving devices exposed. Although exploitation requires local network access, the publicly disclosed exploit details increase the risk of attacks by insiders or compromised hosts within the LAN. The lack of authentication on the web interface exacerbates the risk. The CVSS 4.0 score of 5.3 reflects a medium severity, balancing the limited attack surface with the ease of exploitation and impact on device availability. No known exploits are currently active in the wild, but the vulnerability could be leveraged to disrupt network operations, especially in environments relying on these devices for critical connectivity.
Potential Impact
For European organizations, the primary impact is disruption of network availability due to forced device reboots or crashes, potentially causing downtime in local network segments. This can affect business continuity, especially in environments where TOZED ZLT M30S devices serve as critical network infrastructure components such as in small to medium enterprises, branch offices, or industrial control systems. The requirement for local network access limits remote exploitation but raises concerns about insider threats or malware propagation within internal networks. Unavailability of these devices could interrupt internet access, intranet services, or connectivity to operational technology systems, leading to productivity losses and potential safety risks in industrial settings. The absence of vendor patches prolongs exposure, increasing the window for exploitation. Additionally, the public disclosure of the vulnerability and exploit details may encourage attackers to target vulnerable networks, particularly in sectors with less mature network segmentation and monitoring practices.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict network segmentation to isolate TOZED ZLT M30S devices from untrusted or general user segments, limiting access to the local network where these devices reside. Access controls should be enforced to restrict who can send HTTP POST requests to the device's web interface, ideally allowing only trusted administrators or management systems. Monitoring network traffic for suspicious POST requests containing 'goformId=REBOOT_DEVICE' can provide early detection of exploitation attempts. If possible, disable or restrict the web interface access to management VLANs or via secure management channels such as VPNs. Organizations should also consider replacing affected devices with alternative hardware from vendors with active security support if firmware updates or patches remain unavailable. Regular network device inventory and firmware version audits will help identify vulnerable devices. Finally, educating internal users about the risks of local network attacks and maintaining strong endpoint security can reduce the risk of insider or malware-driven exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-14105: Denial of Service in TOZED ZLT M30S
Description
CVE-2025-14105 is a medium-severity denial of service vulnerability affecting TOZED ZLT M30S and ZLT M30S PRO devices running firmware versions 1. 47 and 3. 09. 06. The flaw exists in the web interface component, specifically in the /reqproc/proc_post function, where manipulation of the 'goformId' argument with the input 'REBOOT_DEVICE' can cause the device to become unavailable. Exploitation requires local network access, does not require authentication or user interaction, and can be performed remotely within the LAN. The vendor has not responded to disclosure attempts, and no patches are currently available. Although no known exploits are in the wild, the vulnerability has been publicly disclosed and could be leveraged to disrupt network availability. European organizations using these devices in their local networks may face service interruptions impacting operational continuity. Mitigation involves network segmentation, restricting local network access to trusted users, monitoring for suspicious POST requests targeting 'goformId', and considering device replacement or firmware updates if available.
AI-Powered Analysis
Technical Analysis
CVE-2025-14105 identifies a denial of service (DoS) vulnerability in the TOZED ZLT M30S and ZLT M30S PRO routers, specifically affecting firmware versions 1.47 and 3.09.06. The vulnerability resides in the web interface component, within the /reqproc/proc_post handler. An attacker can send a crafted HTTP POST request manipulating the 'goformId' parameter with the value 'REBOOT_DEVICE', triggering a reboot or crash condition that results in denial of service. The attack vector is limited to the local network (AV:A), requiring no privileges (PR:N), no authentication (AT:N), and no user interaction (UI:N). The vulnerability impacts availability (VA:L) but does not affect confidentiality or integrity. The vendor was notified but has not issued a patch or response, leaving devices exposed. Although exploitation requires local network access, the publicly disclosed exploit details increase the risk of attacks by insiders or compromised hosts within the LAN. The lack of authentication on the web interface exacerbates the risk. The CVSS 4.0 score of 5.3 reflects a medium severity, balancing the limited attack surface with the ease of exploitation and impact on device availability. No known exploits are currently active in the wild, but the vulnerability could be leveraged to disrupt network operations, especially in environments relying on these devices for critical connectivity.
Potential Impact
For European organizations, the primary impact is disruption of network availability due to forced device reboots or crashes, potentially causing downtime in local network segments. This can affect business continuity, especially in environments where TOZED ZLT M30S devices serve as critical network infrastructure components such as in small to medium enterprises, branch offices, or industrial control systems. The requirement for local network access limits remote exploitation but raises concerns about insider threats or malware propagation within internal networks. Unavailability of these devices could interrupt internet access, intranet services, or connectivity to operational technology systems, leading to productivity losses and potential safety risks in industrial settings. The absence of vendor patches prolongs exposure, increasing the window for exploitation. Additionally, the public disclosure of the vulnerability and exploit details may encourage attackers to target vulnerable networks, particularly in sectors with less mature network segmentation and monitoring practices.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict network segmentation to isolate TOZED ZLT M30S devices from untrusted or general user segments, limiting access to the local network where these devices reside. Access controls should be enforced to restrict who can send HTTP POST requests to the device's web interface, ideally allowing only trusted administrators or management systems. Monitoring network traffic for suspicious POST requests containing 'goformId=REBOOT_DEVICE' can provide early detection of exploitation attempts. If possible, disable or restrict the web interface access to management VLANs or via secure management channels such as VPNs. Organizations should also consider replacing affected devices with alternative hardware from vendors with active security support if firmware updates or patches remain unavailable. Regular network device inventory and firmware version audits will help identify vulnerable devices. Finally, educating internal users about the risks of local network attacks and maintaining strong endpoint security can reduce the risk of insider or malware-driven exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-05T14:38:45.603Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69334b6ff88dbe026c1e4442
Added to database: 12/5/2025, 9:15:27 PM
Last enriched: 12/12/2025, 10:33:32 PM
Last updated: 1/20/2026, 5:31:51 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14977: CWE-284 Improper Access Control in dokaninc Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy
HighCVE-2025-14348: CWE-285 Improper Authorization in wedevs weMail – Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation
MediumCVE-2026-23917
LowCVE-2026-23916
LowCVE-2026-23915
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.