Description

The equipment initially can be configured using the manufacturer's application, by Wi-Fi, by the web server or with the manufacturer’s software. Using the manufacturer's software, the device can be configured via UDP. Analyzing this communication, it has been observed that any aspect of the initial configuration can be changed by means of the device's MAC without the need for authentication.

INFO

Published Date :

2025-10-31T14:23:06.442Z

Last Modified :

2025-11-03T19:06:16.313Z

Source :

S21sec
AFFECTED PRODUCTS

The following products are affected by CVE-2025-64385 vulnerability.

Vendors Products
Circutor
  • Tcprs1plus
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability