Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 07 Jan 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zspace
Zspace z4pro\+ Zspace z4pro\+ Firmware |
|
| CPEs | cpe:2.3:h:zspace:z4pro\+:-:*:*:*:*:*:*:* cpe:2.3:o:zspace:z4pro\+_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Zspace
Zspace z4pro\+ Zspace z4pro\+ Firmware |
Mon, 29 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 28 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in ZSPACE Z4Pro+ 1.0.0440024. Impacted is the function zfilev2_api_SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure. | |
| Title | ZSPACE Z4Pro+ HTTP POST Request status zfilev2_api_SafeStatus command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-29T18:01:13.797Z
Reserved: 2025-12-27T09:36:42.617Z
Link: CVE-2025-15131
Updated: 2025-12-29T18:01:10.913Z
Status : Analyzed
Published: 2025-12-28T10:15:41.110
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-15131
No data.
OpenCVE Enrichment
No data.