[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-29013":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":42,"name":43,"published":44,"updated":34},29013,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},2,"Nuclei",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":37,"public_recommendation":38,"recommendation":34,"references":39,"cvssv3":34,"epss_score":34,"epss_percentile":34,"cve":34,"in_cisa_catalog":41,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"high","The risk exists that the IoT device might have a login panel that could be brute-forced or might hide an undisclosed vulnerability that could be leveraged in 0-day attack campaigns.","A default login was discovered on a Circutor Line-TCPRS1 device. An attacker can obtain access to user accounts, access sensitive information, modify data, and execute unauthorized operations.","If the device is not intended to be exposed to the internet, we strongly recommend placing it behind a firewall. If it is, we suggest keeping it up to date and having strong passwords on any exposed login panels.",[40],"https://circutor.com/en/products/line-tcprs1/",false,"NETSCAN-NUCLEI-IOT-CIRCUTOR-DEFAULT-LOGIN","Circutor Line-TCPRS1 - Default Login","2026-03-11T00:00:00Z"]