Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64385: CWE-20 Improper Input Validation in Circutor TCPRS1plus

0
Critical
VulnerabilityCVE-2025-64385cvecve-2025-64385cwe-20
Published: Fri Oct 31 2025 (10/31/2025, 14:23:06 UTC)
Source: CVE Database V5
Vendor/Project: Circutor
Product: TCPRS1plus

Description

The equipment initially can be configured using the manufacturer's application, by Wi-Fi, by the web server or with the manufacturer’s software. Using the manufacturer's software, the device can be configured via UDP. Analyzing this communication, it has been observed that any aspect of the initial configuration can be changed by means of the device's MAC without the need for authentication.

AI-Powered Analysis

AILast updated: 11/08/2025, 02:25:51 UTC

Technical Analysis

CVE-2025-64385 identifies a critical security vulnerability in the Circutor TCPRS1plus device, specifically version 1.0.14. The vulnerability arises from improper input validation (CWE-20) in the device's configuration process. The device can be configured initially through multiple interfaces, including Wi-Fi, a web server, and the manufacturer's software. The manufacturer's software allows configuration via UDP packets. Analysis reveals that the device accepts configuration changes over UDP based solely on the device's MAC address without requiring any authentication or user interaction. This means an attacker who can spoof the MAC address of a target device can send malicious UDP packets to alter any aspect of the device's initial configuration. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The vulnerability impacts confidentiality minimally (VC:N), but has a high impact on availability (VA:H) and a low impact on integrity (VI:L), with scope limited to the vulnerable component (SI:L) and high security requirements (SA:H). This vulnerability could allow attackers to disrupt device operations, potentially causing denial of service or enabling further attacks by manipulating device settings. No patches or firmware updates are currently available, and no exploits have been reported in the wild. The vulnerability was published on October 31, 2025, and assigned by S21sec.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as energy management, manufacturing, and industrial automation, this vulnerability poses a significant risk. Circutor devices like the TCPRS1plus are used for power monitoring and energy management, making them integral to operational stability. Unauthorized configuration changes could lead to device misbehavior, inaccurate data reporting, or complete denial of service, disrupting business operations and potentially causing safety hazards. The lack of authentication means attackers can remotely exploit this vulnerability without needing credentials or user interaction, increasing the risk of widespread attacks. Additionally, compromised devices could be leveraged as entry points for lateral movement within industrial networks, threatening broader organizational security. The impact on availability and integrity could lead to regulatory non-compliance and financial losses. Given the criticality of energy and industrial sectors in Europe, the threat is particularly concerning for organizations relying on Circutor devices for operational continuity.

Mitigation Recommendations

1. Immediately implement network segmentation to isolate Circutor TCPRS1plus devices from general enterprise networks and restrict access to trusted management systems only. 2. Employ strict MAC address filtering on network switches and routers to prevent unauthorized devices from spoofing legitimate MAC addresses associated with TCPRS1plus devices. 3. Monitor UDP traffic directed at these devices for anomalous or unexpected configuration packets, using intrusion detection systems (IDS) or network behavior analysis tools. 4. Disable or restrict UDP-based configuration interfaces if possible until a vendor patch is available. 5. Engage with Circutor to obtain firmware updates or patches addressing this vulnerability and apply them promptly once released. 6. Conduct regular audits of device configurations to detect unauthorized changes early. 7. Implement strong physical security controls to prevent local network access that could facilitate MAC spoofing. 8. Educate operational technology (OT) and IT security teams about this vulnerability and the importance of monitoring and controlling device configuration channels.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
S21sec
Date Reserved
2025-10-31T13:13:35.298Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6904c9ac8ec00889be37f4ff

Added to database: 10/31/2025, 2:37:32 PM

Last enriched: 11/8/2025, 2:25:51 AM

Last updated: 12/14/2025, 3:42:48 AM

Views: 187

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats