CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert, adding three vulnerabilities affecting D-Link devices to its Known Exploited Vulnerabilities (KEV) Catalog.

The inclusion of these flaws in the catalog signifies that they are being actively exploited by malicious cyber actors in real-world attacks, posing a significant threat to networks.

The three vulnerabilities impact several D-Link products and are now under a mandate for federal agencies to address. The specific vulnerabilities are:

  • CVE-2020-25078: An unspecified vulnerability affecting D-Link DCS-2530L and DCS-2670L security cameras.
  • CVE-2020-25079: A command injection vulnerability, also impacting the D-Link DCS-2530L and DCS-2670L camera models.
  • CVE-2022-40799: A vulnerability that allows for the download of code without an integrity check in the D-Link DNR-322L network video recorder.

These types of security flaws are common entry points for attackers. Command injection vulnerabilities, for instance, can allow an attacker to execute arbitrary commands on the operating system of the device, potentially leading to a complete takeover.

Similarly, the ability to download and execute code without verifying its integrity opens the door for malware to be installed, turning the compromised device into a tool for broader network infiltration or a node in a botnet.

The addition of these CVEs to the KEV Catalog falls under the Binding Operational Directive (BOD) 22-01, a directive that mandates Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by a specified due date.

The directive established the KEV Catalog as a dynamic list of known CVEs that present a significant risk to the federal enterprise. The goal is to ensure that federal networks are protected against active and ongoing threats.

While BOD 22-01 is only mandatory for FCEB agencies, CISA has strongly urged all organizations, both public and private, to take this warning seriously.

The agency recommends that all entities reduce their exposure to cyberattacks by prioritizing the timely remediation of vulnerabilities listed in the KEV Catalog as a core part of their vulnerability management practices.

CISA continuously updates the catalog as new evidence of active exploitation emerges, based on a set of specified criteria.

Device owners are encouraged to check for firmware updates from the manufacturer and apply them immediately to mitigate these threats.

Equip your SOC with full access to the latest threat data from ANY.RUN TI Lookup that can Improve incident response -> Get 14-day Free Trial

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

13-year-old Critical Redis RCE Vulnerability Let Attackers Gain Full Access to Host System

A 13-year-old critical remote code execution (RCE) vulnerability in Redis, dubbed RediShell, allows attackers to…

1 hour ago

Reemo Unveils Bastion+: A Scalable Solution for Global Privileged Access Management

Paris, France, October 6th, 2025, CyberNewsWire Reemo continues its mission to secure enterprise remote access…

10 hours ago

Threat Actors Claim Breach Of Huawei Technologies Source Code and Internal Tools

A threat actor has claimed responsibility for a significant data breach at Huawei Technologies, a…

13 hours ago

Doctors Imaging Group Suffers Data Breach – 171800+ Users Data Exposed

Doctors Imaging Group, a healthcare provider based in Florida, has reported a significant data breach…

13 hours ago

Forensic-Timeliner – Windows Forensic Tool for DFIR Investigators

Forensic-Timeliner, a Windows forensic tool for DFIR investigators, has released version 2.2, which offers enhanced…

14 hours ago

NCSC Warns of Oracle E-Business Suite 0-Day Vulnerability Actively Exploited in Attacks

NCSC has issued an urgent warning regarding a critical zero-day flaw in Oracle E-Business Suite…

14 hours ago