circutor CVE Vulnerabilities & Metrics

Focus on circutor vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About circutor Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with circutor. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total circutor CVEs: 10
Earliest CVE date: 09 Jun 2021, 12:15 UTC
Latest CVE date: 18 Sep 2024, 14:15 UTC

Latest CVE reference: CVE-2024-8891

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 6

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical circutor CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.32

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 6
4.0-6.9 1
7.0-8.9 1
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS circutor CVEs

These are the five CVEs with the highest CVSS scores for circutor, sorted by severity first and recency.

All CVEs for circutor

CVE-2024-8891 circutor vulnerability CVSS: 0 18 Sep 2024, 14:15 UTC

An attacker with no knowledge of the current users in the web application, could build a dictionary of potential users and check the server responses as it indicates whether or not the user is present in CIRCUTOR Q-SMT in its firmware version 1.0.4.

CVE-2024-8892 circutor vulnerability CVSS: 0 18 Sep 2024, 13:15 UTC

Vulnerability in CIRCUTOR TCP2RS+ firmware version 1.3b, which could allow an attacker to modify any configuration value, even if the device has the user/password authentication option enabled, without authentication by sending packets through the UDP protocol and port 2000, deconfiguring the device and thus disabling its use. This equipment is at the end of its useful life cycle.

CVE-2024-8890 circutor vulnerability CVSS: 0 18 Sep 2024, 13:15 UTC

An attacker with access to the network where the CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could obtain legitimate credentials or steal sessions due to the fact that the device only implements the HTTP protocol. This fact prevents a secure communication channel from being established.

CVE-2024-8889 circutor vulnerability CVSS: 0 18 Sep 2024, 12:15 UTC

Vulnerability in CIRCUTOR TCP2RS+ firmware version 1.3b, which could allow an attacker to modify any configuration value, even if the device has the user/password authentication option enabled, without authentication by sending packets through the UDP protocol and port 2000, deconfiguring the device and thus disabling its use. This equipment is at the end of its useful life cycle.

CVE-2024-8888 circutor vulnerability CVSS: 0 18 Sep 2024, 12:15 UTC

An attacker with access to the network where CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could steal the tokens used on the web, since these have no expiration date to access the web application without restrictions. Token theft can originate from different methods such as network captures, locally stored web information, etc.

CVE-2024-8887 circutor vulnerability CVSS: 0 18 Sep 2024, 11:15 UTC

CIRCUTOR Q-SMT in its firmware version 1.0.4, could be affected by a denial of service (DoS) attack if an attacker with access to the web service bypasses the authentication mechanisms on the login page, allowing the attacker to use all the functionalities implemented at web level that allow interacting with the device.

CVE-2022-1669 circutor vulnerability CVSS: 5.5 24 May 2022, 18:15 UTC

A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address.

CVE-2021-26777 circutor vulnerability CVSS: 10.0 02 Dec 2021, 04:15 UTC

Buffer overflow vulnerability in function SetFirewall in index.cgi in CIRCUTOR COMPACT DC-S BASIC smart metering concentrator Firwmare version CIR_CDC_v1.2.17, allows attackers to execute arbitrary code.

CVE-2021-33842 circutor vulnerability CVSS: 7.7 09 Jun 2021, 12:15 UTC

Improper Authentication vulnerability in the cookie parameter of Circutor SGE-PLC1000 firmware version 0.9.2b allows an attacker to perform operations as an authenticated user. In order to exploit this vulnerability, the attacker must be within the network where the device affected is located.

CVE-2021-33841 circutor vulnerability CVSS: 10.0 09 Jun 2021, 12:15 UTC

SGE-PLC1000 device, in its 0.9.2b firmware version, does not handle some requests correctly, allowing a remote attacker to inject code into the operating system with maximum privileges.