A vulnerability was identified in TOZED ZLT T10 T10PLUS_3.04.15. The affected element is an unknown function of the file /reqproc/proc_post of the component Reboot Handler. Such manipulation leads to denial of service. Access to the local network is required for this attack to succeed. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://vuldb.com/?ctiid.331635 | Permissions Required VDB Entry |
| https://vuldb.com/?id.331635 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.679507 | Exploit Third Party Advisory VDB Entry |
| https://youtu.be/3Me3wlH5cfU | Exploit |
| https://www.youtube.com/watch?v=3Me3wlH5cfU | Exploit |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-09 08:15
Updated : 2025-12-09 17:11
NVD link : CVE-2025-12917
Mitre link : CVE-2025-12917
CVE.ORG link : CVE-2025-12917
JSON object : View
Products Affected
gztozed
- zlt_t10_plus_firmware
- zlt_t10_plus
CWE
CWE-404
Improper Resource Shutdown or Release
