Insecure Deserialization in GuanxingLu vlarl ZeroMQ Component
CVE-2025-10975
Key Information:
- Vendor
Guanxinglu
- Status
- Vendor
- CVE Published:
- 25 September 2025
Badges
What is CVE-2025-10975?
A deserialization vulnerability has been identified in the GuanxingLu vlarl component related to the ZeroMQ library. Specifically, the flaw resides in the run_reasoning_server
function within experiments/robot/bridge/reasoning_server.py
. An attacker can exploit this vulnerability by manipulating the Message argument, allowing for potential remote code execution. As the product follows a rolling release model, specific version information for patches or affected releases is typically unavailable. The existence of public exploits heightens the urgency for users to assess their implementations and mitigate potential risks.
Affected Version(s)
vlarl 31abc0baf53ef8f5db666a1c882e1ea64def2997
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved