Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication

Posted on November 20, 2025November 20, 2025 By CWS

Twonky Server model 8.5.2 incorporates two crucial authentication bypass vulnerabilities that enable unauthenticated attackers to achieve full administrative entry to the media server software program.

Rapid7 found that the vulnerabilities could be chained collectively to compromise administrator accounts with none person interplay or legitimate credentials. The vulnerabilities have an effect on Twonky Server installations on each Linux and Home windows platforms.

Twonky Server is broadly deployed in network-attached storage (NAS) units, routers, set-top packing containers, and gateways worldwide. With roughly 850 situations at the moment uncovered to the general public web, based on Shodan knowledge.

Vulnerabilities Let Attackers Bypass Authentication

The primary vulnerability (CVE-2025-13315) permits attackers to bypass API authentication controls by means of an alternate routing mechanism.

Through the use of the “/nmc/rpc/” prefix as an alternative of the usual “/rpc/” path, attackers can entry the log_getfile endpoint with out authentication.

This endpoint exposes utility logs containing the administrator’s username and encrypted password.

The second vulnerability (CVE-2025-13316) makes password decryption simple. Twonky Server makes use of hardcoded Blowfish encryption keys throughout all installations.

CVEDescriptionCVSS ScoreCVE-2025-13315API authentication bypass by way of various routing9.3 (Crucial)CVE-2025-13316Hardcoded encryption keys allow password decryption8.2 (Excessive)

Rapid7 researchers recognized twelve static keys embedded within the compiled binary, that means any attacker with data of the encrypted password can decrypt it to plaintext utilizing these publicly accessible keys.

Rapid7 appropriately reported these vulnerabilities to Lynx Expertise, the seller behind Twonky Server.

Nevertheless, the seller ceased communications after acknowledging receipt of the technical disclosure and acknowledged that patches wouldn’t be attainable.

Model 8.5.2 stays the most recent accessible launch with no safety updates. Organizations utilizing Twonky Server ought to instantly prohibit utility site visitors to trusted IP addresses solely.

All administrator credentials ought to be thought-about compromised and rotated if the server is uncovered to untrusted networks.

Rapid7 has launched a Metasploit module that demonstrates the entire exploitation chain and plans to offer detection capabilities in its vulnerability scanning instruments.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Authentication, Bypass, Critical, Server, Twonky, Vulnerabilities

Post navigation

Previous Post: Recent 7-Zip Vulnerability Exploited in Attacks
Next Post: Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums

Related Posts

Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware Cyber Security News
Chrome Security Update – Patch for 21 Vulnerabilities that Allows Attackers to Crash Browser Cyber Security News
Critical Imunify360 AV Vulnerability Exposes 56 Million Linux-hosted Websites to RCE Attacks Cyber Security News
APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data Cyber Security News
New Technique Uncovered To Exploit Linux Kernel Use-After-Free Vulnerability Cyber Security News
Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums
  • Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication
  • Recent 7-Zip Vulnerability Exploited in Attacks
  • Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files
  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums
  • Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication
  • Recent 7-Zip Vulnerability Exploited in Attacks
  • Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files
  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News