Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack

Posted on September 3, 2025September 3, 2025 By CWS

The US cybersecurity company CISA issued a contemporary warning {that a} lacking authentication vulnerability in TP-Hyperlink TL-WA855RE Wi-Fi vary extender merchandise has been exploited in assaults.

Tracked as CVE-2020-24363 (CVSS rating of 8.8), the flaw is described as a lacking authentication for a important operate challenge that permits an attacker on the identical community to ship unauthenticated requests for a manufacturing facility reset and reboot.

“The attacker can then get hold of incorrect entry management by setting a brand new administrative password,” a NIST advisory reads.

In August 2020, malwrforensics warned that, though the system’s net interface requires authentication to entry administrative controls, unauthenticated attackers can ship TDDP_RESET POST requests and circumvent the mechanism.

“Nevertheless, an attacker can bypass it and use the APIs supplied to ship the TDDP_RESET code which doesn’t have any authentication,” malwrforensics stated.

TP-Hyperlink resolved the vulnerability over half a decade in the past, in firmware launch (EU)_V5_200731, and has since launched a number of different firmware updates for the extender. Nevertheless, the TL-WA855RE extender is now marked as discontinued on the corporate’s web site.

On Tuesday, CISA added CVE-2020-24363 to its Identified Exploited Vulnerabilities (KEV) catalog together with the not too long ago disclosed WhatsApp zero-day, urging federal businesses to handle each by September 23.

“The impacted merchandise may very well be end-of-life (EoL) and/or end-of-service (EoS). Customers ought to discontinue product utilization,” CISA notes in CVE-2020-24363’s description.Commercial. Scroll to proceed studying.

There look like no experiences on the CVE’s in-the-wild exploitation previous to CISA’s warning, however proof-of-concept (PoC) exploit code focusing on the vulnerability has been publicly out there since July 2020.

Associated: Sangoma Patches Important Zero-Day Exploited to Hack FreePBX Servers

Associated: WhatsApp Zero-Day Exploited in Assaults Focusing on Apple Customers

Associated: Hundreds of SaaS Apps May Nonetheless Be Prone to nOAuth

Associated: Microsoft Utilizing AI to Uncover Important Bootloader Vulnerabilities

Security Week News Tags:Active, Agency, Attack, Cybersecurity, Extender, Flags, Range, Vulnerability, WiFi

Post navigation

Previous Post: A Milestone Powering Crypto’s Global Reach
Next Post: CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access

Related Posts

Former US Soldier Who Hacked AT&T and Verizon Pleads Guilty Security Week News
OpenAI to Help DoD With Cyber Defense Under New $200 Million Contract Security Week News
Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack Security Week News
Critical Vulnerability Patched in SAP NetWeaver Security Week News
Qantas Hit with Extortion Demand After Data Breach Security Week News
Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation
  • New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers
  • Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer
  • How to Close the AI Governance Gap in Software Development
  • TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation
  • New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers
  • Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer
  • How to Close the AI Governance Gap in Software Development
  • TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News