Circutor Q Smt Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Circutor Q Smt Firmware.
By the Year
In 2026 there have been 0 vulnerabilities in Circutor Q Smt Firmware. Q Smt Firmware did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 4 | 7.55 |
It may take a day or so for new Q Smt Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Circutor Q Smt Firmware Security Vulnerabilities
User Enumeration via Server Responses in Circutor QSMT 1.0.4
CVE-2024-8891
5.3 - Medium
- September 18, 2024
An attacker with no knowledge of the current users in the web application, could build a dictionary of potential users and check the server responses as it indicates whether or not the user is present in CIRCUTOR Q-SMT in its firmware version 1.0.4.
Privacy violation
CIRCUTOR QSMT v1.0.4 HTTP Lacks SSL, Enables Credential Theft
CVE-2024-8890
8.8 - High
- September 18, 2024
An attacker with access to the network where the CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could obtain legitimate credentials or steal sessions due to the fact that the device only implements the HTTP protocol. This fact prevents a secure communication channel from being established.
Insertion of Sensitive Information Into Sent Data
CIRCUTOR Q-SMT v1.0.4 Web Token Theft (no expiration)
CVE-2024-8888
7.5 - High
- September 18, 2024
An attacker with access to the network where CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could steal the tokens used on the web, since these have no expiration date to access the web application without restrictions. Token theft can originate from different methods such as network captures, locally stored web information, etc.
Insufficient Session Expiration
DoS in CIRCUTOR Q-SMT firmware 1.0.4 via web service authentication bypass
CVE-2024-8887
8.6 - High
- September 18, 2024
CIRCUTOR Q-SMT in its firmware version 1.0.4, could be affected by a denial of service (DoS) attack if an attacker with access to the web service bypasses the authentication mechanisms on the login page, allowing the attacker to use all the functionalities implemented at web level that allow interacting with the device.
Improper Validation of Specified Quantity in Input
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Circutor Q Smt Firmware or by Circutor? Click the Watch button to subscribe.