meetcircle CVE Vulnerabilities & Metrics

Focus on meetcircle vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About meetcircle Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with meetcircle. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total meetcircle CVEs: 23
Earliest CVE date: 07 Nov 2017, 16:29 UTC
Latest CVE date: 05 Apr 2018, 19:29 UTC

Latest CVE reference: CVE-2017-12095

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical meetcircle CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.68

Max CVSS: 9.3

Critical CVEs (≥9): 5

CVSS Range vs. Count

Range Count
0.0-3.9 4
4.0-6.9 7
7.0-8.9 7
9.0-10.0 5

CVSS Distribution Chart

Top 5 Highest CVSS meetcircle CVEs

These are the five CVEs with the highest CVSS scores for meetcircle, sorted by severity first and recency.

All CVEs for meetcircle

CVE-2017-12095 meetcircle vulnerability CVSS: 3.3 05 Apr 2018, 19:29 UTC

An exploitable vulnerability exists in the WiFi Access Point feature of Circle with Disney running firmware 2.0.1. A series of WiFi packets can force Circle to setup an Access Point with default credentials. An attacker needs to send a series of spoofed "de-auth" packets to trigger this vulnerability.

CVE-2017-2917 meetcircle vulnerability CVSS: 9.0 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the notifications functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

CVE-2017-2916 meetcircle vulnerability CVSS: 9.0 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the /api/CONFIG/restore functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an arbitrary file to be overwritten. An attacker can send an HTTP request to trigger this vulnerability.

CVE-2017-2915 meetcircle vulnerability CVSS: 7.7 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the WiFi configuration functionality of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary shell commands. An attacker needs to send a couple of HTTP requests and setup an access point reachable by the device to trigger this vulnerability.

CVE-2017-2914 meetcircle vulnerability CVSS: 6.8 07 Nov 2017, 16:29 UTC

An exploitable authentication bypass vulnerability exists in the API daemon of Circle with Disney running firmware 2.0.1. A specially crafted token can bypass the authentication routine of the Apid binary, causing the device to grant unintended administrative access. An attacker needs network connectivity to the device to trigger this vulnerability.

CVE-2017-2913 meetcircle vulnerability CVSS: 2.6 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the filtering functionality of Circle with Disney. SSL certificates for specific domain names can cause the Bluecoat library to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.

CVE-2017-2912 meetcircle vulnerability CVSS: 2.6 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the remote control functionality of Circle with Disney running firmware 2.0.1. SSL certificates for specific domain names can cause the goclient daemon to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.

CVE-2017-2911 meetcircle vulnerability CVSS: 2.6 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the remote control functionality of Circle with Disney running firmware 2.0.1. SSL certificates for specific domain names can cause the rclient daemon to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.

CVE-2017-2898 meetcircle vulnerability CVSS: 8.5 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the signature verification of the firmware update functionality of Circle with Disney. Specially crafted network packets can cause an unsigned firmware to be installed in the device resulting in arbitrary code execution. An attacker can send a series of packets to trigger this vulnerability.

CVE-2017-2890 meetcircle vulnerability CVSS: 9.0 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the /api/CONFIG/restore functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request trigger this vulnerability.

CVE-2017-2889 meetcircle vulnerability CVSS: 7.8 07 Nov 2017, 16:29 UTC

An exploitable Denial of Service vulnerability exists in the API daemon of Circle with Disney running firmware 2.0.1. A large amount of simultaneous TCP connections causes the APID daemon to repeatedly fork, causing the daemon to run out of memory and trigger a device reboot. An attacker needs network connectivity to the device to trigger this vulnerability.

CVE-2017-2884 meetcircle vulnerability CVSS: 7.8 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the user photo update functionality of Circle with Disney running firmware 2.0.1. A repeated set of specially crafted API calls can cause the device to corrupt essential memory, resulting in a bricked device. An attacker needs network connectivity to the device to trigger this vulnerability.

CVE-2017-2883 meetcircle vulnerability CVSS: 9.3 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the database update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the device to execute arbitrary code. An attacker needs to impersonate a remote server in order to trigger this vulnerability.

CVE-2017-2882 meetcircle vulnerability CVSS: 6.8 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the servers update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the device to overwrite sensitive files, resulting in code execution. An attacker needs to impersonate a remote server in order to trigger this vulnerability.

CVE-2017-2881 meetcircle vulnerability CVSS: 5.8 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the torlist update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability.

CVE-2017-2866 meetcircle vulnerability CVSS: 9.0 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the /api/CONFIG/backup functionality of Circle with Disney. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

CVE-2017-2865 meetcircle vulnerability CVSS: 7.9 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the firmware update functionality of Circle with Disney. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability.

CVE-2017-2864 meetcircle vulnerability CVSS: 7.5 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the generation of authentication token functionality of Circle with Disney. Specially crafted network packets can cause a valid authentication token to be returned to the attacker resulting in authentication bypass. An attacker can send a series of packets to trigger this vulnerability.

CVE-2017-12096 meetcircle vulnerability CVSS: 6.1 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the WiFi management of Circle with Disney. A crafted Access Point with the same name as the legitimate one can be used to make Circle connect to an untrusted network. An attacker needs to setup an Access Point reachable by the device and to send a series of spoofed "deauth" packets to trigger this vulnerability.

CVE-2017-12094 meetcircle vulnerability CVSS: 6.1 07 Nov 2017, 16:29 UTC

An exploitable vulnerability exists in the WiFi Channel parsing of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary sed commands. An attacker needs to setup an access point reachable by the device to trigger this vulnerability.

CVE-2017-12085 meetcircle vulnerability CVSS: 7.5 07 Nov 2017, 16:29 UTC

An exploitable routing vulnerability exists in the Circle with Disney cloud infrastructure. A specially crafted packet can make the Circle cloud route a packet to any arbitrary Circle device. An attacker needs network connectivity to the Internet to trigger this vulnerability.

CVE-2017-12084 meetcircle vulnerability CVSS: 6.0 07 Nov 2017, 16:29 UTC

A backdoor vulnerability exists in remote control functionality of Circle with Disney running firmware 2.0.1. A specific set of network packets can remotely start an SSH server on the device, resulting in a persistent backdoor. An attacker can send an API call to enable the SSH server.

CVE-2017-12083 meetcircle vulnerability CVSS: 5.0 07 Nov 2017, 16:29 UTC

An exploitable information disclosure vulnerability exists in the apid daemon of the Circle with Disney running firmware 2.0.1. A specially crafted set of packets can make the Disney Circle dump strings from an internal database into an HTTP response. An attacker needs network connectivity to the Internet to trigger this vulnerability.