Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64388: CWE-400 Uncontrolled Resource Consumption in Circutor TCPRS1plus

0
Critical
VulnerabilityCVE-2025-64388cvecve-2025-64388cwe-400
Published: Fri Oct 31 2025 (10/31/2025, 14:17:00 UTC)
Source: CVE Database V5
Vendor/Project: Circutor
Product: TCPRS1plus

Description

Denial of service of the web server through specific requests to this protocol

AI-Powered Analysis

AILast updated: 10/31/2025, 14:29:48 UTC

Technical Analysis

CVE-2025-64388 is a critical denial of service vulnerability affecting Circutor's TCPRS1plus device, specifically version 1.0.14. The vulnerability arises from uncontrolled resource consumption (CWE-400) triggered by specially crafted requests sent to the device's web server protocol. An attacker can exploit this remotely over the network without any authentication or user interaction, making it highly accessible for exploitation. The attack causes the device to consume excessive resources, such as CPU or memory, leading to a crash or unresponsiveness of the web server component, effectively denying service to legitimate users. The CVSS 4.0 vector indicates no privileges required (PR:N), no user interaction (UI:N), and no confidentiality or integrity impact, but a high availability impact (VA:H). This suggests the primary risk is operational disruption rather than data compromise. No patches or fixes have been released at the time of publication, and no active exploits are reported, but the critical severity score (9.2) highlights the urgency for mitigation. The device is typically deployed in industrial and energy management environments, where availability is crucial. The lack of authentication and ease of triggering the vulnerability increases the attack surface significantly. Organizations should monitor network traffic for anomalous requests targeting the TCPRS1plus web server and implement network segmentation and filtering to limit exposure. Close coordination with Circutor for updates and patches is essential to remediate the vulnerability once available.

Potential Impact

The primary impact of CVE-2025-64388 is a denial of service condition that disrupts the availability of the TCPRS1plus device's web server. For European organizations, especially those in critical infrastructure sectors such as energy management, industrial automation, and utilities where Circutor products are deployed, this can lead to operational outages, loss of monitoring and control capabilities, and potential cascading effects on broader systems. The inability to access or manage the device remotely could delay incident response and maintenance activities. Since the vulnerability does not affect confidentiality or integrity, data breaches are less likely; however, the operational impact can be severe, potentially affecting service continuity and safety. The ease of exploitation without authentication increases the risk of widespread attacks, including from opportunistic threat actors. This could also impact compliance with European regulations on critical infrastructure resilience and operational security. The lack of patches at present means organizations must rely on compensating controls to mitigate risk until a fix is available.

Mitigation Recommendations

1. Implement network-level filtering to restrict access to the TCPRS1plus web server interface, allowing only trusted management networks or IP addresses. 2. Deploy rate limiting and anomaly detection on network devices to identify and block suspicious request patterns targeting the vulnerable protocol. 3. Segment the network to isolate the TCPRS1plus devices from general enterprise networks and the internet to reduce exposure. 4. Monitor device logs and network traffic for signs of resource exhaustion or unusual request volumes indicative of exploitation attempts. 5. Engage with Circutor support channels to obtain information on patches or firmware updates addressing this vulnerability and plan timely deployment once available. 6. Develop and test incident response procedures specific to device unavailability scenarios to minimize operational impact. 7. Consider temporary disabling or restricting the vulnerable web server functionality if feasible without disrupting critical operations. 8. Maintain up-to-date asset inventories to identify all affected devices and prioritize mitigation efforts accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
S21sec
Date Reserved
2025-10-31T13:13:35.299Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6904c7b38ec00889be3656e7

Added to database: 10/31/2025, 2:29:07 PM

Last enriched: 10/31/2025, 2:29:48 PM

Last updated: 10/31/2025, 8:07:59 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats