⚠ Actively exploited
Added to CISA KEV on 2025-08-05. Federal agencies required to patch by 2025-08-26. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..

CVE-2020-25079

CWE-77Command Injection5 documents5 sources
Severity
8.8HIGH
EPSS
48.3%
top 2.26%
CISA KEV
KEV
Added 2025-08-05
Due 2025-08-26
Exploit
No known exploits
Timeline
PublishedSep 2
KEV addedAug 5
KEV dueAug 26
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Description

An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02 devices. cgi-bin/ddns_enc.cgi allows authenticated command injection.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages8 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-w49v-8458-hh85: An issue was discovered on D-Link DCS-2530L before 12022-05-24
CVEList
CVE-2020-25079: An issue was discovered on D-Link DCS-2530L before 12020-09-02
VulnCheck
D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability2020

📋Vendor Advisories

1
CISA
D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability2025-08-05