Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15133: Command Injection in ZSPACE Z4Pro+

0
Medium
VulnerabilityCVE-2025-15133cvecve-2025-15133
Published: Sun Dec 28 2025 (12/28/2025, 11:02:10 UTC)
Source: CVE Database V5
Vendor/Project: ZSPACE
Product: Z4Pro+

Description

A vulnerability was identified in ZSPACE Z4Pro+ 1.0.0440024. The impacted element is the function zfilev2_api_CloseSafe of the file /v2/file/safe/close of the component HTTP POST Request Handler. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:20:16 UTC

Technical Analysis

CVE-2025-15133 identifies a command injection vulnerability in the ZSPACE Z4Pro+ version 1.0.0440024, specifically within the HTTP POST request handler function zfilev2_api_CloseSafe located at the /v2/file/safe/close endpoint. The vulnerability allows an attacker to remotely inject and execute arbitrary system commands by manipulating input parameters sent to this API endpoint. The flaw stems from insufficient input validation or sanitization, enabling the attacker to craft malicious payloads that the system executes at the OS level. Notably, the attack requires no authentication or user interaction, increasing the risk of exploitation. The CVSS 4.0 score is 5.3 (medium), reflecting the network attack vector, low complexity, and no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. The vendor was notified early, but no patch links are currently available, and no active exploitation in the wild has been reported. The availability of a public exploit increases the urgency for mitigation. This vulnerability could allow attackers to gain unauthorized control over the device, potentially leading to data breaches, device manipulation, or denial of service.

Potential Impact

For European organizations, the impact of CVE-2025-15133 could be significant, especially for those deploying ZSPACE Z4Pro+ devices in critical environments such as education, design, healthcare, or industrial applications where AR/VR technologies are used. Successful exploitation could lead to unauthorized command execution, resulting in data leakage, system compromise, or disruption of services. Given the device’s role in immersive computing, attackers might manipulate outputs or inputs, affecting operational integrity. The remote and unauthenticated nature of the vulnerability increases the risk of widespread exploitation if devices are exposed to untrusted networks. Additionally, the lack of patches at present means organizations must rely on interim mitigations, increasing operational risk. The medium severity score suggests a moderate but non-negligible threat, particularly if attackers combine this vulnerability with other weaknesses to escalate their impact.

Mitigation Recommendations

1. Immediately restrict network access to ZSPACE Z4Pro+ devices by implementing network segmentation and firewall rules that limit inbound connections to trusted management networks only. 2. Monitor network traffic and device logs for unusual POST requests to the /v2/file/safe/close endpoint or other suspicious activity indicative of command injection attempts. 3. Disable or restrict the vulnerable API endpoint if possible via device configuration until a vendor patch is released. 4. Engage with ZSPACE support to obtain timelines for official patches and apply them promptly once available. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection patterns targeting this device. 6. Conduct regular security assessments and penetration tests focusing on AR/VR device infrastructure to identify and remediate similar vulnerabilities. 7. Educate IT and security teams about this vulnerability to ensure rapid response and containment in case of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-27T09:36:50.303Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b4db813ff03e2bef1a

Added to database: 12/30/2025, 10:22:44 PM

Last enriched: 12/30/2025, 11:20:16 PM

Last updated: 2/7/2026, 3:33:02 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats