Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
The new version of the device will use the HTTPS protocol. It is also recommended to deploy it behind a firewall that allows you to prevent this attack.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Circutor
Circutor tcprs1plus |
|
| Vendors & Products |
Circutor
Circutor tcprs1plus |
Fri, 31 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Denial of service of the web server through specific requests to this protocol | |
| Title | Denial of service through specific packets | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: S21sec
Published:
Updated: 2025-11-03T15:47:20.502Z
Reserved: 2025-10-31T13:13:35.299Z
Link: CVE-2025-64388
Updated: 2025-10-31T14:41:51.928Z
Status : Awaiting Analysis
Published: 2025-10-31T15:15:43.917
Modified: 2025-11-04T15:41:31.450
Link: CVE-2025-64388
No data.
OpenCVE Enrichment
Updated: 2025-11-03T10:43:54Z