Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15131: Command Injection in ZSPACE Z4Pro+

0
Medium
VulnerabilityCVE-2025-15131cvecve-2025-15131
Published: Sun Dec 28 2025 (12/28/2025, 10:02:06 UTC)
Source: CVE Database V5
Vendor/Project: ZSPACE
Product: Z4Pro+

Description

A vulnerability was found in ZSPACE Z4Pro+ 1.0.0440024. Impacted is the function zfilev2_api_SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:19:35 UTC

Technical Analysis

CVE-2025-15131 is a command injection vulnerability identified in the ZSPACE Z4Pro+ device, version 1.0.0440024. The vulnerability resides in the HTTP POST request handler, specifically the zfilev2_api_SafeStatus function located at the endpoint /v2/file/safe/status. An attacker can craft malicious HTTP POST requests to inject arbitrary commands into the system, which the device executes with the privileges of the vulnerable service. This flaw does not require user interaction or elevated privileges, making it remotely exploitable over the network. The vulnerability affects the confidentiality, integrity, and availability of the device, as attackers can execute commands that may lead to data leakage, system compromise, or denial of service. The CVSS 4.0 vector indicates low attack complexity, no privileges required, and no user interaction, but with low impact on confidentiality, integrity, and availability individually, resulting in an overall medium severity score of 5.3. Although no known exploits are currently active in the wild, the public disclosure of exploit code increases the risk of exploitation. The vendor has been notified early, but no patch links are currently available. This vulnerability is critical for organizations relying on ZSPACE Z4Pro+ for augmented reality applications, training, or visualization, as it could lead to unauthorized control over the device and potentially the network it resides on.

Potential Impact

For European organizations, the impact of CVE-2025-15131 can be significant, especially in industries such as manufacturing, healthcare, education, and defense where ZSPACE Z4Pro+ devices might be used for immersive training, simulation, or design. Successful exploitation could allow attackers to execute arbitrary commands remotely, potentially leading to unauthorized data access, manipulation of sensitive information, disruption of training or operational workflows, and lateral movement within the network. This could result in intellectual property theft, operational downtime, and reputational damage. Given the device’s role in interactive environments, availability disruption could also impair critical training or operational processes. The medium severity rating suggests a moderate but tangible risk that requires proactive mitigation to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Monitor vendor communications closely for official patches or firmware updates addressing CVE-2025-15131 and apply them promptly once available. 2. Restrict network access to the ZSPACE Z4Pro+ management interfaces by implementing network segmentation and firewall rules that limit HTTP POST requests to trusted sources only. 3. Employ intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous HTTP POST requests targeting the /v2/file/safe/status endpoint. 4. Disable or restrict the vulnerable API endpoint if possible, or implement application-layer filtering to validate and sanitize inputs before processing. 5. Conduct regular security audits and penetration testing on devices to identify potential exploitation attempts. 6. Enforce strong authentication and access controls around device management to reduce the risk of unauthorized access. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response to suspicious activity related to ZSPACE devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-27T09:36:42.617Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b4db813ff03e2bef0e

Added to database: 12/30/2025, 10:22:44 PM

Last enriched: 12/30/2025, 11:19:35 PM

Last updated: 2/7/2026, 11:33:42 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats