Print-n-Panic: Raise3D’s Pro2 Series Vulnerability Could Leave Printers Exposed!

View CSAF: Raise3D’s Pro2 Series printers are in the hot seat with a vulnerability that’s easier to exploit than a piñata at a toddler’s birthday party. With a CVSS v4 score of 8.8, this authentication bypass could expose your data faster than a magician’s reveal. Disable developer mode and stay vigilant!

Pro Dashboard

Hot Take:

If you thought your 3D printer was just for making cute little Yoda figures, think again! Apparently, it’s also a prime target for hackers. Who knew your Pro2 Series could end up being the “Pro” at sharing your secrets with the world? Better lock that developer mode down before your printer starts printing your tax returns by accident.

Key Points:

  • Raise3D Pro2 Series printers are vulnerable to an authentication bypass.
  • This security flaw could lead to data exfiltration and device compromise.
  • The vulnerability has been assigned CVE-2025-10653 with a CVSS score of 8.8.
  • Disabling developer mode is currently recommended to prevent exploitation.
  • No known public exploitation of this vulnerability has been reported yet.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?