⚠ Actively exploited
Added to CISA KEV on 2025-08-05. Federal agencies required to patch by 2025-08-26. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..

CVE-2020-25078

8 documents8 sources
Severity
7.5HIGH
EPSS
94.1%
top 0.09%
CISA KEV
KEV
Added 2025-08-05
Due 2025-08-26
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedSep 2
KEV addedAug 5
KEV dueAug 26
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Description

An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02 devices. The unauthenticated /config/getuser endpoint allows for remote administrator password disclosure.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages8 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-858v-pcfh-p8xg: An issue was discovered on D-Link DCS-2530L before 12022-05-24
CVEList
CVE-2020-25078: An issue was discovered on D-Link DCS-2530L before 12020-09-02
VulnCheck
D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability2020

💥Exploits & PoCs

1
Nuclei
D-Link DCS-2530L/DCS-2670L - Administrator Password Disclosure

📋Vendor Advisories

1
CISA
D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability2025-08-05

🕵️Threat Intelligence

1
Unit42
Top CVEs to Patch: Insights from the 2022 Unit 42 Network Threat Trends Research Report2022-07-21
CVE-2020-25078 (HIGH CVSS 7.5) | An issue was discovered on D-Link D | cvebase.io