A vulnerability was found in TOZED ZLT M30s up to 1.47. Impacted is an unknown function of the file /reqproc/proc_post of the component Web Management Interface. Performing manipulation of the argument goformId results in information disclosure. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 21 Jan 2026 05:00:00 +0900

Type Values Removed Values Added
First Time appeared Gztozed
Gztozed zlt M30s
Gztozed zlt M30s Firmware
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:h:gztozed:zlt_m30s:-:*:*:*:*:*:*:*
cpe:2.3:o:gztozed:zlt_m30s_firmware:*:*:*:*:*:*:*:*
Vendors & Products Gztozed
Gztozed zlt M30s
Gztozed zlt M30s Firmware

Tue, 30 Dec 2025 08:15:00 +0900

Type Values Removed Values Added
First Time appeared Tozed
Tozed zlt M30s
Vendors & Products Tozed
Tozed zlt M30s

Sat, 27 Dec 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 26 Dec 2025 02:15:00 +0900

Type Values Removed Values Added
Description A vulnerability was found in TOZED ZLT M30s up to 1.47. Impacted is an unknown function of the file /reqproc/proc_post of the component Web Management Interface. Performing manipulation of the argument goformId results in information disclosure. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title TOZED ZLT M30s Web Management proc_post information disclosure
Weaknesses CWE-200
CWE-284
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-12-26T16:37:54.066Z

Reserved: 2025-12-25T09:36:35.253Z

Link: CVE-2025-15082

cve-icon Vulnrichment

Updated: 2025-12-26T16:37:50.694Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-25T17:15:41.403

Modified: 2026-01-20T19:54:27.513

Link: CVE-2025-15082

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-30T07:33:36Z