Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication

Posted on November 20, 2025November 20, 2025 By CWS

Twonky Server model 8.5.2 incorporates two crucial authentication bypass vulnerabilities that enable unauthenticated attackers to achieve full administrative entry to the media server software program.

Rapid7 found that the vulnerabilities could be chained collectively to compromise administrator accounts with none person interplay or legitimate credentials. The vulnerabilities have an effect on Twonky Server installations on each Linux and Home windows platforms.

Twonky Server is broadly deployed in network-attached storage (NAS) units, routers, set-top packing containers, and gateways worldwide. With roughly 850 situations at the moment uncovered to the general public web, based on Shodan knowledge.

Vulnerabilities Let Attackers Bypass Authentication

The primary vulnerability (CVE-2025-13315) permits attackers to bypass API authentication controls by means of an alternate routing mechanism.

Through the use of the “/nmc/rpc/” prefix as an alternative of the usual “/rpc/” path, attackers can entry the log_getfile endpoint with out authentication.

This endpoint exposes utility logs containing the administrator’s username and encrypted password.

The second vulnerability (CVE-2025-13316) makes password decryption simple. Twonky Server makes use of hardcoded Blowfish encryption keys throughout all installations.

CVEDescriptionCVSS ScoreCVE-2025-13315API authentication bypass by way of various routing9.3 (Crucial)CVE-2025-13316Hardcoded encryption keys allow password decryption8.2 (Excessive)

Rapid7 researchers recognized twelve static keys embedded within the compiled binary, that means any attacker with data of the encrypted password can decrypt it to plaintext utilizing these publicly accessible keys.

Rapid7 appropriately reported these vulnerabilities to Lynx Expertise, the seller behind Twonky Server.

Nevertheless, the seller ceased communications after acknowledging receipt of the technical disclosure and acknowledged that patches wouldn’t be attainable.

Model 8.5.2 stays the most recent accessible launch with no safety updates. Organizations utilizing Twonky Server ought to instantly prohibit utility site visitors to trusted IP addresses solely.

All administrator credentials ought to be thought-about compromised and rotated if the server is uncovered to untrusted networks.

Rapid7 has launched a Metasploit module that demonstrates the entire exploitation chain and plans to offer detection capabilities in its vulnerability scanning instruments.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Authentication, Bypass, Critical, Server, Twonky, Vulnerabilities

Post navigation

Previous Post: Recent 7-Zip Vulnerability Exploited in Attacks
Next Post: CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

Related Posts

Top 10 Best Cyber Threat Intelligence Companies in 2025 Cyber Security News
Insider Threats in 2025 Detection and Prevention Strategies Cyber Security News
Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Cyber Security News
CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks Cyber Security News
Microsoft Outlook Users Face Crashes When Creating New Emails, Temp Fix Issued Cyber Security News
LummaStealer Technical Details Uncovered Using ML-Based Detection Approach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums
  • Vulnerability Allowed Scraping of 3.5 Billion WhatsApp Accounts
  • CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat
  • Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication
  • Recent 7-Zip Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums
  • Vulnerability Allowed Scraping of 3.5 Billion WhatsApp Accounts
  • CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat
  • Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication
  • Recent 7-Zip Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News