ID

VAR-202507-0207


CVE

CVE-2025-7230


TITLE

INVT Electric Co., Ltd.  of  VT Designer  Vulnerability regarding mix-ups in

Trust: 0.8

sources: JVNDB: JVNDB-2025-010207

DESCRIPTION

INVT VT-Designer PM3 File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of INVT VT-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PM3 files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25723. INVT Electric Co., Ltd. of VT Designer contains a type confusion vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 2.25

sources: NVD: CVE-2025-7230 // JVNDB: JVNDB-2025-010207 // ZDI: ZDI-25-481

AFFECTED PRODUCTS

vendor:invtmodel:vt designerscope:eqversion:2.1.13

Trust: 1.0

vendor:invt electricmodel:vt designerscope: - version: -

Trust: 0.8

vendor:invt electricmodel:vt designerscope:eqversion:2.1.13

Trust: 0.8

vendor:invt electricmodel:vt designerscope:eqversion: -

Trust: 0.8

vendor:invtmodel:vt-designerscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-25-481 // JVNDB: JVNDB-2025-010207 // NVD: CVE-2025-7230

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2025-7230
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-010207
value: HIGH

Trust: 0.8

ZDI: CVE-2025-7230
value: HIGH

Trust: 0.7

zdi-disclosures@trendmicro.com: CVE-2025-7230
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.0

OTHER: JVNDB-2025-010207
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2025-7230
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-25-481 // JVNDB: JVNDB-2025-010207 // NVD: CVE-2025-7230

PROBLEMTYPE DATA

problemtype:CWE-843

Trust: 1.0

problemtype:Mistake of type (CWE-843) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-010207 // NVD: CVE-2025-7230

EXTERNAL IDS

db:NVDid:CVE-2025-7230

Trust: 3.3

db:ZDIid:ZDI-25-481

Trust: 2.5

db:JVNDBid:JVNDB-2025-010207

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-25723

Trust: 0.7

sources: ZDI: ZDI-25-481 // JVNDB: JVNDB-2025-010207 // NVD: CVE-2025-7230

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-25-481/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-7230

Trust: 0.8

sources: JVNDB: JVNDB-2025-010207 // NVD: CVE-2025-7230

CREDITS

kimiya

Trust: 0.7

sources: ZDI: ZDI-25-481

SOURCES

db:ZDIid:ZDI-25-481
db:JVNDBid:JVNDB-2025-010207
db:NVDid:CVE-2025-7230

LAST UPDATE DATE

2025-08-01T23:22:02.117000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-25-481date:2025-07-07T00:00:00
db:JVNDBid:JVNDB-2025-010207date:2025-07-30T04:59:00
db:NVDid:CVE-2025-7230date:2025-07-29T17:20:29.490

SOURCES RELEASE DATE

db:ZDIid:ZDI-25-481date:2025-07-07T00:00:00
db:JVNDBid:JVNDB-2025-010207date:2025-07-30T00:00:00
db:NVDid:CVE-2025-7230date:2025-07-21T20:15:43.487