{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15082","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-25T09:36:35.253Z","datePublished":"2025-12-25T17:02:09.345Z","dateUpdated":"2025-12-26T16:37:54.066Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-25T17:02:09.345Z"},"title":"TOZED ZLT M30s Web Management proc_post information disclosure","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-200","lang":"en","description":"Information Disclosure"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"TOZED","product":"ZLT M30s","versions":[{"version":"1.0","status":"affected"},{"version":"1.1","status":"affected"},{"version":"1.2","status":"affected"},{"version":"1.3","status":"affected"},{"version":"1.4","status":"affected"},{"version":"1.5","status":"affected"},{"version":"1.6","status":"affected"},{"version":"1.7","status":"affected"},{"version":"1.8","status":"affected"},{"version":"1.9","status":"affected"},{"version":"1.10","status":"affected"},{"version":"1.11","status":"affected"},{"version":"1.12","status":"affected"},{"version":"1.13","status":"affected"},{"version":"1.14","status":"affected"},{"version":"1.15","status":"affected"},{"version":"1.16","status":"affected"},{"version":"1.17","status":"affected"},{"version":"1.18","status":"affected"},{"version":"1.19","status":"affected"},{"version":"1.20","status":"affected"},{"version":"1.21","status":"affected"},{"version":"1.22","status":"affected"},{"version":"1.23","status":"affected"},{"version":"1.24","status":"affected"},{"version":"1.25","status":"affected"},{"version":"1.26","status":"affected"},{"version":"1.27","status":"affected"},{"version":"1.28","status":"affected"},{"version":"1.29","status":"affected"},{"version":"1.30","status":"affected"},{"version":"1.31","status":"affected"},{"version":"1.32","status":"affected"},{"version":"1.33","status":"affected"},{"version":"1.34","status":"affected"},{"version":"1.35","status":"affected"},{"version":"1.36","status":"affected"},{"version":"1.37","status":"affected"},{"version":"1.38","status":"affected"},{"version":"1.39","status":"affected"},{"version":"1.40","status":"affected"},{"version":"1.41","status":"affected"},{"version":"1.42","status":"affected"},{"version":"1.43","status":"affected"},{"version":"1.44","status":"affected"},{"version":"1.45","status":"affected"},{"version":"1.46","status":"affected"},{"version":"1.47","status":"affected"}],"modules":["Web Management Interface"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in TOZED ZLT M30s up to 1.47. Impacted is an unknown function of the file /reqproc/proc_post of the component Web Management Interface. Performing manipulation of the argument goformId results in information disclosure. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-25T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-25T10:42:22.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"S33K3R (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.338410","name":"VDB-338410 | TOZED ZLT M30s Web Management proc_post information disclosure","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.338410","name":"VDB-338410 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.707306","name":"Submit #707306 | ZLT M30s MTNNGRM30S_1.47, M30S_1.47 (other versions might be vulnerable) Improper Access Control - Critical Information Disclosure","tags":["third-party-advisory"]},{"url":"https://www.hacklab.eu.org/blogs/zlt_m30s_information_disclosure","tags":["related"]},{"url":"https://youtu.be/u_H29UdiPOc","tags":["exploit","media-coverage"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-26T16:37:43.640193Z","id":"CVE-2025-15082","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-26T16:37:54.066Z"}}]}}