Metrics
Affected Vendors & Products
No advisories yet.
Solution
The new version of the device will use the HTTPS protocol. It is also recommended to deploy it behind a firewall that allows you to prevent this attack.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Circutor
Circutor tcprs1plus |
|
| Vendors & Products |
Circutor
Circutor tcprs1plus |
Fri, 31 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Denial of service of the web server through specific requests to this protocol | |
| Title | Denial of service through specific packets | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: S21sec
Published:
Updated: 2025-11-03T15:47:20.502Z
Reserved: 2025-10-31T13:13:35.299Z
Link: CVE-2025-64388
Updated: 2025-10-31T14:41:51.928Z
Status : Awaiting Analysis
Published: 2025-10-31T15:15:43.917
Modified: 2025-11-04T15:41:31.450
Link: CVE-2025-64388
No data.
OpenCVE Enrichment
Updated: 2025-11-03T10:43:54Z