Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks

CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks

Posted on August 6, 2025August 6, 2025 By CWS

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has issued a brand new alert, including three vulnerabilities affecting D-Hyperlink units to its Identified Exploited Vulnerabilities (KEV) Catalog.

The inclusion of those flaws within the catalog signifies that they’re being actively exploited by malicious cyber actors in real-world assaults, posing a major risk to networks.

The three vulnerabilities affect a number of D-Hyperlink merchandise and at the moment are underneath a mandate for federal companies to deal with. The precise vulnerabilities are:

CVE-2020-25078: An unspecified vulnerability affecting D-Hyperlink DCS-2530L and DCS-2670L safety cameras.

CVE-2020-25079: A command injection vulnerability, additionally impacting the D-Hyperlink DCS-2530L and DCS-2670L digicam fashions.

CVE-2022-40799: A vulnerability that enables for the obtain of code with out an integrity examine within the D-Hyperlink DNR-322L community video recorder.

These kind of safety flaws are widespread entry factors for attackers. Command injection vulnerabilities, as an illustration, can enable an attacker to execute arbitrary instructions on the working system of the gadget, doubtlessly main to an entire takeover.

Equally, the flexibility to obtain and execute code with out verifying its integrity opens the door for malware to be put in, turning the compromised gadget right into a instrument for broader community infiltration or a node in a botnet.

The addition of those CVEs to the KEV Catalog falls underneath the Binding Operational Directive (BOD) 22-01, a directive that mandates Federal Civilian Government Department (FCEB) companies to remediate recognized vulnerabilities by a specified due date.

The directive established the KEV Catalog as a dynamic record of identified CVEs that current a major danger to the federal enterprise. The purpose is to make sure that federal networks are protected towards energetic and ongoing threats.

Whereas BOD 22-01 is simply obligatory for FCEB companies, CISA has strongly urged all organizations, each private and non-private, to take this warning severely.

The company recommends that every one entities cut back their publicity to cyberattacks by prioritizing the well timed remediation of vulnerabilities listed within the KEV Catalog as a core a part of their vulnerability administration practices.

CISA repeatedly updates the catalog as new proof of energetic exploitation emerges, primarily based on a set of specified standards.

Machine house owners are inspired to examine for firmware updates from the producer and apply them instantly to mitigate these threats.

Equip your SOC with full entry to the newest risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Actively, Attacks, CISA, DLink, Exploited, Vulnerabilities, Warns

Post navigation

Previous Post: U.S. Treasury Warns of Crypto ATMs Fueling Criminal Activity
Next Post: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks

Related Posts

New Angular Vulnerability Enables an Attacker to Execute Malicious Payload New Angular Vulnerability Enables an Attacker to Execute Malicious Payload Cyber Security News
Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS Cyber Security News
Chinese PlushDaemon Hackers use EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers Chinese PlushDaemon Hackers use EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers Cyber Security News
Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets Cyber Security News
NordVPN Denies Data Breach Following Threat Actor Claim on Dark Web NordVPN Denies Data Breach Following Threat Actor Claim on Dark Web Cyber Security News
Delta Dental of Virginia Data Breach Exposes 146,000+ Customers Personal Details Delta Dental of Virginia Data Breach Exposes 146,000+ Customers Personal Details Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark