Using the manufacturer's software, the device can be configured via UDP. Analyzing this communication, it has been observed that any aspect of the initial configuration can be changed by means of the device's MAC without the need for authentication.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
This service has been removed in the new version.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 03 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Circutor
Circutor tcprs1plus |
|
| Vendors & Products |
Circutor
Circutor tcprs1plus |
Fri, 31 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The equipment initially can be configured using the manufacturer's application, by Wi-Fi, by the web server or with the manufacturer’s software. Using the manufacturer's software, the device can be configured via UDP. Analyzing this communication, it has been observed that any aspect of the initial configuration can be changed by means of the device's MAC without the need for authentication. | |
| Title | INCORRECT SECURITY VALIDATION IN SENDING UDP FRAMES | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: S21sec
Published:
Updated: 2025-11-03T19:06:16.313Z
Reserved: 2025-10-31T13:13:35.298Z
Link: CVE-2025-64385
Updated: 2025-11-03T19:06:13.481Z
Status : Awaiting Analysis
Published: 2025-10-31T15:15:43.527
Modified: 2025-11-04T15:41:31.450
Link: CVE-2025-64385
No data.
OpenCVE Enrichment
Updated: 2025-11-03T10:43:52Z