ZLT M30s Information Disclosure

From Info Disclosure to Full Admin Access

From Info Disclosure to Full Admin Access

9th Nov 2025

CVEHardware

ZLT M30s Critical Information Dislosure Vulnerability

Category: CVE

Researcher: Ramon Bello (gr33pp / S33K3R)

CVE-XXXX-XXXXX (Hopefully, if not, still valid imo)

TL; DR

The /reqproc/proc_post endpoint of the web management interface can be accessed without authentication and returns sensitive device information through isTest parameter set to false and goformId parameter set to export_information. This includes configuration data that exposes administrative account credentials in plaintext. As a result, an attacker can retrieve information sufficient to gain full access to the device’s web management interface.

Proof of Concept (PoC) - Steps to Reproduce

  1. Connect to the device through it's wifi or usb tethering
  2. Identify the device gateway IP, this is where the management interface is usually located.
  3. Send a POST request to http://<TARGET_IP>/reqproc/proc_post with the body isTest=false&goformId=export_information. No cookies or authentication headers are required.
  4. The server responds with a JSON object containing the device configuration path, ready to be downloaded.
  5. Visit http://<TARGET_IP>/export_information.zip to download.

With the zip downloaded and unzipped, it contains information relating to the internals of the router, leaking critical information like the web interface admin details.

PoC

photo

photo

The zip is password protected, I was able to unzip with password tozed.

The tmp/export_nv_show file particularly contains the admin credentials to the web interface.

VIDEO POC

Click the image to watch the video

IMAGE ALT TEXT HERE