Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15082: Information Disclosure in TOZED ZLT M30s

0
Medium
VulnerabilityCVE-2025-15082cvecve-2025-15082
Published: Thu Dec 25 2025 (12/25/2025, 17:02:09 UTC)
Source: CVE Database V5
Vendor/Project: TOZED
Product: ZLT M30s

Description

CVE-2025-15082 is a medium severity information disclosure vulnerability affecting TOZED ZLT M30s devices up to version 1. 47. The flaw exists in the Web Management Interface, specifically in the /reqproc/proc_post file, where manipulation of the goformId argument can leak sensitive information. The vulnerability is remotely exploitable without authentication or user interaction, and an exploit has been publicly disclosed. Although the vendor was notified, no patch or response has been provided. This vulnerability could allow attackers to gain unauthorized access to information that may aid further attacks or compromise device confidentiality. European organizations using these devices in their network infrastructure could be at risk, especially in critical sectors relying on these devices. Mitigation requires network-level protections and monitoring due to the lack of vendor patches. Countries with higher adoption of TOZED ZLT M30s or strategic infrastructure using these devices are more likely to be impacted.

AI-Powered Analysis

AILast updated: 01/01/2026, 22:37:09 UTC

Technical Analysis

CVE-2025-15082 is an information disclosure vulnerability identified in the TOZED ZLT M30s device series, affecting all firmware versions up to 1.47. The vulnerability resides in an unspecified function within the /reqproc/proc_post file of the device's Web Management Interface. By manipulating the 'goformId' argument in HTTP requests, an attacker can remotely trigger unintended information disclosure. The vulnerability requires no authentication, user interaction, or privileges, and can be exploited over the network, making it highly accessible to attackers. The disclosed CVSS 4.0 score of 6.9 reflects a medium severity level, primarily due to the lack of integrity or availability impact but significant confidentiality concerns. The vendor was informed early but has not issued any patches or advisories, increasing the risk of exploitation. Although no known exploits in the wild have been reported yet, the public availability of exploit code raises the likelihood of imminent attacks. The vulnerability could expose sensitive configuration data or internal device information, potentially facilitating further compromise or lateral movement within affected networks. The broad range of affected versions indicates a long-standing issue, emphasizing the need for immediate defensive measures. Given the device's role in network management, exploitation could undermine the security posture of organizations relying on these devices for critical infrastructure management.

Potential Impact

For European organizations, the impact of CVE-2025-15082 can be significant, especially for those deploying TOZED ZLT M30s devices in network management or security-critical roles. Information disclosure could reveal sensitive configuration details, credentials, or internal network topology, enabling attackers to plan more sophisticated intrusions or escalate privileges. This is particularly concerning for sectors such as telecommunications, energy, finance, and government, where network devices are integral to operational continuity and data protection. The lack of vendor response and patches increases exposure time, raising the risk of exploitation. Additionally, since the vulnerability is remotely exploitable without authentication, attackers can target these devices directly from the internet or internal networks if adequate segmentation is not enforced. This could lead to breaches of confidentiality, potential regulatory non-compliance under GDPR if personal data is indirectly exposed, and reputational damage. The medium severity rating suggests that while the vulnerability does not directly impact device integrity or availability, the confidentiality breach alone can have cascading effects on organizational security.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should implement compensating controls to mitigate the risk from CVE-2025-15082. First, restrict network access to the Web Management Interface of TOZED ZLT M30s devices by implementing strict firewall rules and access control lists (ACLs), allowing only trusted management hosts to connect. Deploy network segmentation to isolate these devices from general user networks and the internet. Enable and monitor logging on these devices and network infrastructure to detect anomalous requests targeting the 'goformId' parameter or unusual HTTP POST activity. Use intrusion detection/prevention systems (IDS/IPS) with custom signatures to identify exploitation attempts. Consider deploying web application firewalls (WAF) in front of management interfaces to filter malicious input. If possible, disable the Web Management Interface or restrict it to out-of-band management networks. Conduct regular vulnerability scans and penetration tests focusing on these devices to identify exploitation attempts. Finally, maintain an inventory of affected devices and prepare for rapid patch deployment once the vendor releases a fix or consider alternative devices with better security support if feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-25T09:36:35.253Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694d6f65f4aff2fc0818851c

Added to database: 12/25/2025, 5:07:49 PM

Last enriched: 1/1/2026, 10:37:09 PM

Last updated: 2/7/2026, 8:45:26 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats