⚠ Actively exploited
Added to CISA KEV on 2025-08-05. Federal agencies required to patch by 2025-08-26. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2020-25078
8 documents8 sources
Severity
7.5HIGH
EPSS
94.1%
top 0.09%
CISA KEV
KEV
Added 2025-08-05
Due 2025-08-26
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedSep 2
KEV addedAug 5
KEV dueAug 26
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02 devices. The unauthenticated /config/getuser endpoint allows for remote administrator password disclosure.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages8 packages
Patches
🔴Vulnerability Details
3💥Exploits & PoCs
1Nuclei▶
D-Link DCS-2530L/DCS-2670L - Administrator Password Disclosure
📋Vendor Advisories
1🕵️Threat Intelligence
1Unit42
▶