Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 07 Jan 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zspace
Zspace z4pro\+ Zspace z4pro\+ Firmware |
|
| CPEs | cpe:2.3:h:zspace:z4pro\+:-:*:*:*:*:*:*:* cpe:2.3:o:zspace:z4pro\+_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Zspace
Zspace z4pro\+ Zspace z4pro\+ Firmware |
Mon, 29 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 28 Dec 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in ZSPACE Z4Pro+ 1.0.0440024. The affected element is the function zfilev2_api_open of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure. | |
| Title | ZSPACE Z4Pro+ HTTP POST Request open zfilev2_api_open command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-29T18:00:46.951Z
Reserved: 2025-12-27T09:36:47.274Z
Link: CVE-2025-15132
Updated: 2025-12-29T18:00:43.931Z
Status : Analyzed
Published: 2025-12-28T11:15:40.063
Modified: 2026-01-07T21:42:09.460
Link: CVE-2025-15132
No data.
OpenCVE Enrichment
No data.