Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
The new version of the device will use the HTTPS protocol.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Circutor
Circutor tcprs1plus |
|
| Vendors & Products |
Circutor
Circutor tcprs1plus |
Fri, 31 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The web application is vulnerable to a so-called ‘clickjacking’ attack. In this type of attack, the vulnerable page is inserted into a page controlled by the attacker in order to deceive the victim. This deception can range from making the victim click on a button to making them enter their login credentials in a form that, a priori, appears legitimate. | |
| Title | CLICKJACKING | |
| Weaknesses | CWE-1021 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: S21sec
Published:
Updated: 2025-11-03T15:48:02.400Z
Reserved: 2025-10-31T13:13:35.299Z
Link: CVE-2025-64387
Updated: 2025-10-31T14:38:11.065Z
Status : Awaiting Analysis
Published: 2025-10-31T15:15:43.773
Modified: 2025-11-04T15:41:31.450
Link: CVE-2025-64387
No data.
OpenCVE Enrichment
Updated: 2025-11-03T10:44:02Z