TOZED ZLT M30s Information Disclosure via Debug Interface

ZLT M30S v1.47 - Information Exposure via Debug Interface

TOZED ZLT M30S v1.47 - Information Exposure via Debug Interface

9th Nov 2025

CVEHardware

ZLT M30S v1.47 - Information Exposure via Debug Interface

Category: CVE

Researcher: Ramon Bello (gr33pp / S33K3R)

CVE-XXXX-XXXXX (Hopefully, if not, still valid imo)

TL; DR

Information exposure vulnerability has been identified in TOZED ZLT M30S firmware verson v1.47. The device's internal Universal Asynchronous Reciever-Transmitter (UART) debugging console, logs the current and factory-set default Wi-Fi credentials in plain text during the boot and factory reset sequences, respectively.

POC

Access requirements: Requires Physical Access to the device, a USB-to-TTL serial adapter and some soldering skills :) (I have a bad soldering iron btw )

Steps

  1. Decouple the the mobile router and separate the PCB from the casing.

Step 1

  1. Locate the UART pads, it is beside the reset button.

Step 2TX GND RX pads identified

  1. Using your soldering skills, attach wires to the three pads. GND pad is quite flexible, I took mine from the negative battery terminal (Remember I have a bad soldering iron TT )

Step 3

  1. Connect the wires to your USB-to-TTL serial adapter. Here, I used a raspberry pico lying around as my serial adapter.

Step 4

  1. Using a serial monitor, e.g picocom, minicom. Connect the serial adapter USB to a computer, identify the adapter tty name. Mine runs at /dev/ttyACM0. Launch picocom to use your serial adapter and the baud rate set to 921600. I had to bruteforce to get the working baud rate.
  2. If your router is turned on already, reboot it through the button and observe the serial monitor output, search for inputStr or outputStr, there you will find the current Wi-Fi password set to the router.

Step 6

The same thing occurs on factory reset through the reset button, the logs reveals the default password to the router.

Step6 B

What next?

lol

I still need proper hardware pentest tools. I'm open to sponsorships. My contact links are in the homepage and footer. Thanks for reading! :)