Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15083: On-Chip Debug and Test Interface With Improper Access Control in TOZED ZLT M30s

0
Low
VulnerabilityCVE-2025-15083cvecve-2025-15083
Published: Thu Dec 25 2025 (12/25/2025, 17:32:06 UTC)
Source: CVE Database V5
Vendor/Project: TOZED
Product: ZLT M30s

Description

A vulnerability was determined in TOZED ZLT M30s up to 1.47. The affected element is an unknown function of the component UART Interface. Executing manipulation can lead to on-chip debug and test interface with improper access control. The physical device can be targeted for the attack. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/25/2025, 17:52:36 UTC

Technical Analysis

The vulnerability CVE-2025-15083 affects the TOZED ZLT M30s embedded device series up to firmware version 1.47. It stems from improper access control on an on-chip debug and test interface accessible via the UART interface. This interface is typically used for device debugging and testing during manufacturing or maintenance. Due to insufficient access restrictions, an attacker with physical access to the device can manipulate this interface to potentially control or extract sensitive information from the chip. The attack requires physical proximity and specialized knowledge, making exploitation highly complex. The CVSS 4.0 vector indicates the attack vector is physical (AV:P), with high attack complexity (AC:H), no privileges or user interaction needed, and low impact on confidentiality. The vendor TOZED has not issued patches or responded to the vulnerability report, and no known exploits have been observed in the wild. This vulnerability primarily threatens environments where physical device security is weak or devices are deployed in untrusted locations.

Potential Impact

For European organizations, the impact is generally limited due to the requirement for physical access and the complexity of exploitation. However, organizations deploying TOZED ZLT M30s devices in critical infrastructure, industrial control systems, or sensitive environments could face risks of device manipulation or data leakage if attackers gain physical access. This could lead to compromised device integrity, unauthorized firmware modifications, or disruption of device functionality. The low confidentiality impact reduces the risk of large-scale data breaches, but targeted attacks on high-value assets remain a concern. The lack of vendor response and patches increases the risk exposure over time, especially in sectors with less stringent physical security controls.

Mitigation Recommendations

1. Enforce strict physical security controls around devices using TOZED ZLT M30s to prevent unauthorized physical access. 2. Implement tamper-evident seals or enclosures to detect unauthorized device access attempts. 3. Monitor and audit physical access logs in sensitive environments. 4. Where possible, disable or restrict debug interfaces in production devices or use hardware mechanisms to lock debug ports. 5. Segregate devices in secure zones with controlled access. 6. Engage with the vendor or consider alternative products with better security support if device replacement is feasible. 7. Maintain an inventory of affected devices and track firmware versions to assess exposure. 8. Prepare incident response plans for potential physical compromise scenarios involving these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-25T09:36:38.360Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694d7662f4aff2fc081e1f50

Added to database: 12/25/2025, 5:37:38 PM

Last enriched: 12/25/2025, 5:52:36 PM

Last updated: 12/25/2025, 9:51:09 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats