Vulnerabilities
Vulnerable Software
Circutor:  >> Q-Smt  Security Vulnerabilities
An attacker with no knowledge of the current users in the web application, could build a dictionary of potential users and check the server responses as it indicates whether or not the user is present in CIRCUTOR Q-SMT in its firmware version 1.0.4.
CVSS Score
5.3
EPSS Score
0.001
Published
2024-09-18
An attacker with access to the network where the CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could obtain legitimate credentials or steal sessions due to the fact that the device only implements the HTTP protocol. This fact prevents a secure communication channel from being established.
CVSS Score
8.0
EPSS Score
0.0
Published
2024-09-18
An attacker with access to the network where CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could steal the tokens used on the web, since these have no expiration date to access the web application without restrictions. Token theft can originate from different methods such as network captures, locally stored web information, etc.
CVSS Score
10.0
EPSS Score
0.001
Published
2024-09-18
CIRCUTOR Q-SMT in its firmware version 1.0.4, could be affected by a denial of service (DoS) attack if an attacker with access to the web service bypasses the authentication mechanisms on the login page, allowing the attacker to use all the functionalities implemented at web level that allow interacting with the device.
CVSS Score
10.0
EPSS Score
0.003
Published
2024-09-18


Contact Us

Shodan ® - All rights reserved