Description
The equipment initially can be configured using the manufacturer's application, by Wi-Fi, by the web server or with the manufacturer’s software. Using the manufacturer's software, the device can be configured via UDP. Analyzing this communication, it has been observed that any aspect of the initial configuration can be changed by means of the device's MAC without the need for authentication.
INFO
Published Date :
2025-10-31T14:23:06.442Z
Last Modified :
2025-11-03T19:06:16.313Z
Source :
S21sec
AFFECTED PRODUCTS
The following products are affected by CVE-2025-64385 vulnerability.
| Vendors | Products |
|---|---|
| Circutor |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-64385.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability