Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication

Posted on November 20, 2025November 20, 2025 By CWS

Twonky Server model 8.5.2 incorporates two crucial authentication bypass vulnerabilities that enable unauthenticated attackers to achieve full administrative entry to the media server software program.

Rapid7 found that the vulnerabilities could be chained collectively to compromise administrator accounts with none person interplay or legitimate credentials. The vulnerabilities have an effect on Twonky Server installations on each Linux and Home windows platforms.

Twonky Server is broadly deployed in network-attached storage (NAS) units, routers, set-top packing containers, and gateways worldwide. With roughly 850 situations at the moment uncovered to the general public web, based on Shodan knowledge.

Vulnerabilities Let Attackers Bypass Authentication

The primary vulnerability (CVE-2025-13315) permits attackers to bypass API authentication controls by means of an alternate routing mechanism.

Through the use of the “/nmc/rpc/” prefix as an alternative of the usual “/rpc/” path, attackers can entry the log_getfile endpoint with out authentication.

This endpoint exposes utility logs containing the administrator’s username and encrypted password.

The second vulnerability (CVE-2025-13316) makes password decryption simple. Twonky Server makes use of hardcoded Blowfish encryption keys throughout all installations.

CVEDescriptionCVSS ScoreCVE-2025-13315API authentication bypass by way of various routing9.3 (Crucial)CVE-2025-13316Hardcoded encryption keys allow password decryption8.2 (Excessive)

Rapid7 researchers recognized twelve static keys embedded within the compiled binary, that means any attacker with data of the encrypted password can decrypt it to plaintext utilizing these publicly accessible keys.

Rapid7 appropriately reported these vulnerabilities to Lynx Expertise, the seller behind Twonky Server.

Nevertheless, the seller ceased communications after acknowledging receipt of the technical disclosure and acknowledged that patches wouldn’t be attainable.

Model 8.5.2 stays the most recent accessible launch with no safety updates. Organizations utilizing Twonky Server ought to instantly prohibit utility site visitors to trusted IP addresses solely.

All administrator credentials ought to be thought-about compromised and rotated if the server is uncovered to untrusted networks.

Rapid7 has launched a Metasploit module that demonstrates the entire exploitation chain and plans to offer detection capabilities in its vulnerability scanning instruments.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Authentication, Bypass, Critical, Server, Twonky, Vulnerabilities

Post navigation

Previous Post: New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices
Next Post: CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

Related Posts

Eaton Vulnerabilities Let Attackers Execute Arbitrary Code On the Host System Cyber Security News
North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data Cyber Security News
Top 10 Best Model Context Protocol (MCP) Servers in 2025 Cyber Security News
Microsoft Windows 11 Insider Preview Build 26200.5600 Released Cyber Security News
Google Drive Desktop for Windows Vulnerability Grants Full Access to Another User’s Drive Cyber Security News
Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark