{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T07:45:39.034","vulnerabilities":[{"cve":{"id":"CVE-2024-8889","sourceIdentifier":"cve-coordination@incibe.es","published":"2024-09-18T12:15:03.710","lastModified":"2024-10-07T17:09:27.603","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in CIRCUTOR TCP2RS+ firmware version 1.3b, which could allow an attacker to modify any configuration value, even if the device has the user/password authentication option enabled, without authentication by sending packets through the UDP protocol and port 2000, deconfiguring the device and thus disabling its use. This equipment is at the end of its useful life cycle."},{"lang":"es","value":"Vulnerabilidad en la versión de firmware 1.3b de CIRCUTOR TCP2RS+, que podría permitir a un atacante modificar cualquier valor de configuración, incluso si el equipo tiene habilitada la opción de autenticación de usuario/contraseña, sin autenticación mediante el envío de paquetes a través del protocolo UDP y el puerto 2000, desconfigurando el equipo y deshabilitando así su uso. Este equipo se encuentra al final de su ciclo de vida útil."}],"metrics":{"cvssMetricV31":[{"source":"cve-coordination@incibe.es","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"cve-coordination@incibe.es","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:circutor:tcp2rs\\+_firmware:1.3b:*:*:*:*:*:*:*","matchCriteriaId":"522FE1C3-3EED-4EC0-B946-5ACD71ACF6DB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:circutor:tcp2rs\\+:-:*:*:*:*:*:*:*","matchCriteriaId":"D3A95ECE-C9F7-477A-862E-EEFA050D4FE0"}]}]}],"references":[{"url":"https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products","source":"cve-coordination@incibe.es","tags":["Third Party Advisory"]}]}}]}