Tcprs1plus Circutor Tcprs1plus

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Circutor Tcprs1plus.

By the Year

In 2026 there have been 0 vulnerabilities in Circutor Tcprs1plus. Last year, in 2025 Tcprs1plus had 5 security vulnerabilities published. Right now, Tcprs1plus is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 5 0.00

It may take a day or so for new Tcprs1plus vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Circutor Tcprs1plus Security Vulnerabilities

UDP Config Gain without Auth via MAC on IoT Device
CVE-2025-64385 - October 31, 2025

The equipment initially can be configured using the manufacturer's application, by Wi-Fi, by the web server or with the manufacturers software. Using the manufacturer's software, the device can be configured via UDP. Analyzing this communication, it has been observed that any aspect of the initial configuration can be changed by means of the device's MAC without the need for authentication.

Improper Input Validation

Sensitive Info Leak: Clear Text Transmission in Device Web Server
CVE-2025-64389 - October 31, 2025

The web server of the device performs exchanges of sensitive information in clear text through an insecure protocol.

Cleartext Transmission of Sensitive Information

Apache HTTP Server DoS via crafted HTTP requests
CVE-2025-64388 - October 31, 2025

Denial of service of the web server through specific requests to this protocol

Resource Exhaustion

Clickjacking Vulnerability in Web App (CVE-2025-64387)
CVE-2025-64387 - October 31, 2025

The web application is vulnerable to a so-called clickjacking attack. In this type of attack, the vulnerable page is inserted into a page controlled by the attacker in order to deceive the victim. This deception can range from making the victim click on a button to making them enter their login credentials in a form that, a priori, appears legitimate.

Clickjacking

JWT Session Hijacking via Token Reuse in IoT Web Server
CVE-2025-64386 - October 31, 2025

The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This will allow an attacker with the token modify parameters of security, access or even steal the session without the legitimate and active session detecting it. The web server allows the attacker to reuse an old session JWT token while the legitimate session is active.

Insufficient Session Expiration

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Circutor Tcprs1plus or by Circutor? Click the Watch button to subscribe.

Circutor
Vendor

subscribe