Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-64386
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
HIJACKING OF THE TOKEN AND GAINING ACCESS
Source: NVD (National Vulnerability Database)
Vulnerability Description
The equipment grants a JWT token for each connection in the timeline, but during an active valid session, a hijacking of the token can be done. This will allow an attacker with the token modify parameters of security, access or even steal the session without the legitimate and active session detecting it. The web server allows the attacker to reuse an old session JWT token while the legitimate session is active.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不充分的会话过期机制
Source: NVD (National Vulnerability Database)
Vulnerability Title
Circutor TCPRS1plus 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Circutor TCPRS1plus是西班牙Circutor公司的一款通信转换器。 Circutor TCPRS1plus存在安全漏洞,该漏洞源于Web服务器允许攻击者在合法会话活动期间重用旧的JWT令牌,可能导致会话劫持和安全参数修改。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
CircutorTCPRS1plus 1.0.14 -
II. Public POCs for CVE-2025-64386
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-64386
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-64386

No comments yet


Leave a comment