Print-n-Panic: Raise3D’s Pro2 Series Vulnerability Could Leave Printers Exposed!
View CSAF: Raise3D’s Pro2 Series printers are in the hot seat with a vulnerability that’s easier to exploit than a piñata at a toddler’s birthday party. With a CVSS v4 score of 8.8, this authentication bypass could expose your data faster than a magician’s reveal. Disable developer mode and stay vigilant!

Hot Take:
If you thought your 3D printer was just for making cute little Yoda figures, think again! Apparently, it’s also a prime target for hackers. Who knew your Pro2 Series could end up being the “Pro” at sharing your secrets with the world? Better lock that developer mode down before your printer starts printing your tax returns by accident.
Key Points:
- Raise3D Pro2 Series printers are vulnerable to an authentication bypass.
- This security flaw could lead to data exfiltration and device compromise.
- The vulnerability has been assigned CVE-2025-10653 with a CVSS score of 8.8.
- Disabling developer mode is currently recommended to prevent exploitation.
- No known public exploitation of this vulnerability has been reported yet.
Already a member? Log in here