CVE-2025-14105
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-05

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was determined in TOZED ZLT M30S and ZLT M30S PRO 1.47/3.09.06. This impacts an unknown function of the file /reqproc/proc_post of the component Web Interface. Executing manipulation of the argument goformId with the input REBOOT_DEVICE can lead to denial of service. The attack can only be done within the local network. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-05
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
tozed zlt_m30s_pro 3.09.06
tozed zlt_m30s 1.47
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-404 The product does not release or incorrectly releases a resource before it is made available for re-use.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the TOZED ZLT M30S and ZLT M30S PRO devices, specifically in the web interface component at the file /reqproc/proc_post. Manipulating the argument 'goformId' with the input 'REBOOT_DEVICE' can cause a denial of service. The attack can only be performed from within the local network, and the exploit has been publicly disclosed.


How can this vulnerability impact me? :

The vulnerability can lead to a denial of service condition on the affected devices, potentially causing them to reboot or become unavailable. This could disrupt normal operations or services relying on these devices within the local network.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending a crafted POST request to the device's /reqproc/proc_post endpoint with the parameter goformId=REBOOT_DEVICE from within the local network. A suggested command to test for the vulnerability is using curl: curl -X POST http://<device-ip>/reqproc/proc_post -d 'goformId=REBOOT_DEVICE'. If the device reboots or becomes unavailable, it is vulnerable. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the device's web interface to trusted users within the local network, monitoring for suspicious POST requests to /reqproc/proc_post with goformId=REBOOT_DEVICE, and considering replacing the affected devices with alternative products, as no patches or countermeasures are currently available. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart