CVE-2025-64385

N/A Unknown
Published: October 31, 2025 Modified: November 04, 2025

Description

The equipment initially can be configured using the manufacturer's application, by Wi-Fi, by the web server or with the manufacturer’s software. Using the manufacturer's software, the device can be configured via UDP. Analyzing this communication, it has been observed that any aspect of the initial configuration can be changed by means of the device's MAC without the need for authentication.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://cds.thalesgroup.com/es/s21sec
Source: 50b5080a-775f-442e-83b5-926b5ca517b6
https://www.hackrtu.com/blog/cg-0day-en-003/
Source: 50b5080a-775f-442e-83b5-926b5ca517b6

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.3%
50th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)