We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in TOZED ZLT W51 up to 1.4.2 and classified as critical. Affected by this issue is some unknown functionality of the component Service Port 7777. The manipulation leads to improper clearing of heap memory before release. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Eine Schwachstelle wurde in TOZED ZLT W51 bis 1.4.2 gefunden. Sie wurde als kritisch eingestuft. Dies betrifft einen unbekannten Teil der Komponente Service Port 7777. Durch die Manipulation mit unbekannten Daten kann eine improper clearing of heap memory before release-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
Improper Clearing of Heap Memory Before Release
2025-05-23: | Advisory disclosed |
2025-05-23: | VulDB entry created |
2025-05-23: | VulDB entry last update |
Mohamed Maatallah (VulDB User)
vuldb.com/?id.310082 (VDB-310082 | TOZED ZLT W51 Service Port 7777 heap inspection)
vuldb.com/?ctiid.310082 (VDB-310082 | CTI Indicators (IOB, IOC))
vuldb.com/?submit.568495 (Submit #568495 | TOZED ZLT W51 Wifi6 Router (Ooredoo) Firmware version 1.4.2 Information Disclosure)
github.com/Zephkek/LeakyTozed
github.com/Zephkek/LeakyTozed
Support options