Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence

CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence

Posted on August 6, 2025August 6, 2025 By CWS

Aug 06, 2025Ravie LakshmananVulnerability / Firmware Safety
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Tuesday added three previous safety flaws impacting D-Hyperlink Wi-Fi cameras and video recorders to its Recognized Exploited Vulnerabilities (KEV) catalog, primarily based on proof of energetic exploitation within the wild.
The high-severity vulnerabilities, that are from 2020 and 2022, are listed beneath –

CVE-2020-25078 (CVSS rating: 7.5) – An unspecified vulnerability in D-Hyperlink DCS-2530L and DCS-2670L gadgets that would permit for distant administrator password disclosure
CVE-2020-25079 (CVSS rating: 8.8) – An authenticated command injection vulnerability within the cgi-bin/ddns_enc.cgi part affecting D-Hyperlink DCS-2530L and DCS-2670L gadgets
CVE-2020-40799 (CVSS rating: 8.8) – A obtain of code with out an integrity verify vulnerability in D-Hyperlink DNR-322L that would permit an authenticated attacker to execute working system-level instructions on the system

There are presently no particulars on how these shortcomings are being exploited within the wild, though a December 2024 advisory from the U.S. Federal Bureau of Investigation (FBI) warned of HiatusRAT campaigns actively scanning internet cameras which are susceptible to CVE-2020-25078.
It is price noting that CVE-2020-40799 stays unpatched because of the affected mannequin reaching end-of-life (EoL) standing as of November 2021. Customers nonetheless counting on DNR-322L are suggested to discontinue and substitute them. Fixes for the opposite two flaws have been launched by D-Hyperlink in 2020.
In gentle of energetic exploitation, it is important that Federal Civilian Government Department (FCEB) businesses perform the mandatory mitigation steps by August 26, 2025, to safe their networks.
(The story was up to date after publication to emphasise that the problems have an effect on D-Hyperlink Wi-Fi cameras and video recorders and never routers as beforehand said. The error is regretted.)

The Hacker News Tags:Active, Adds, Catalog, CISA, DLink, Evidence, Exploitation, KEV, Vulnerabilities

Post navigation

Previous Post: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks
Next Post: Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’

Related Posts

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways JPCERT Confirms Active Command Injection Attacks on Array AG Gateways The Hacker News
Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts The Hacker News
U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes .74 Million U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes $7.74 Million The Hacker News
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws The Hacker News
Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution The Hacker News
Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News