Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

MasterCard rejects pressure from the gaming platform, while Valve tells another story

Inside OpenAI’s quest to make AI do anything for you

Fashion isn’t the only fuss over ads generated by Vogue’s AI

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » TP-Link router defective CVE-2023-33538 Under active exploits, CISA will issue alerts immediately
Identity

TP-Link router defective CVE-2023-33538 Under active exploits, CISA will issue alerts immediately

userBy userJune 17, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 17, 2025Ravi LakshmananNetwork Security / IoT Security

TP-Link router defects

The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added high-strength security flaws in TP-Link wireless routers to its known Exploited Vulnerabilities (KEV) catalogue, citing evidence of aggressive exploitation.

The vulnerability in question is CVE-2023-33538 (CVSS score: 8.8). This is a command injection bug that could cause arbitrary system commands to be executed when processing SSID1 parameters in a specially created HTTP GET request.

“TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 contain command injection vulnerabilities via component/USERRPM/WLANNETWORKRPM.”

Cybersecurity

CISA also warns that the affected products may be end-of-life (EOL) and/or termination of service (EOS), urging users to discontinue use if mitigation is not available.

Currently there is no public information on how the flaws are exploited in the wild.

In December 2024, Palo Alto Networks Unit 42 identified an additional sample of malware centered around an operational technology (OT) called Frostygooop (aka Bustleberm), and revealed that one of the IP addresses corresponding to the ENCO controlled devices acted as a Router web server using the TP link WR740N, accessed from the ENCO device from the Web Browser.

However, it furthermore, “There is no difficult evidence that the attacker exploited it [CVE-2023-33538] In July 2024, Frostigup attacks. ”

Hacker news has been contacted TP-Link for more details. If you’ve heard of it, update the story. In light of active exploitation, federal agencies must fix the defects by July 7, 2025.

The new activity is targeting CVE-2023-28771

Disclosure occurs as Greynoise warned of attempts to exploit targeting critical security flaws affecting the Zyxel firewall (CVE-2023-28771, CVSS score: 9.8).

CVE-2023-28771 refers to a vulnerability in other operating system command injection. This allows unauthorized attackers to execute commands by sending craft requests to sensitive devices. Zyxel applied the patch in April 2023.

The vulnerability was weaponized to build a DDOS botnet such as Mirai shortly after its public disclosure, but the threat intelligence company said it had discovered a growing attempt to exploit it in the same way as on June 16, 2025.

Cybersecurity

As many as 244 unique IP addresses are said to have participated in a short effort, with activities targeting the US, UK, Spain, Germany and India.

“Historical analysis shows that two weeks before June 16th, these IPs were not observed to be engaged in other scans or misuse behaviors, saying they were targeting CVE-2023-28771 only.

To mitigate threats, users are advised to update their Zyxel devices to the latest version, monitor for unusual activity, and limit exposure if applicable.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePFAS blood tests reveal high levels of exposure in the US
Next Article UK aerospace has secured a £250 million boost to drive the green revolution
user
  • Website

Related Posts

CL-STA-0969 installs secret malware on telecom networks during 10 months of spying

August 2, 2025

New “Pest” PAM Backdoor exposes critical Linux systems to silent qualification theft

August 2, 2025

Akira ransomware exploits Sonic Wall VPN with zero-day attacks on fully patched devices

August 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

MasterCard rejects pressure from the gaming platform, while Valve tells another story

Inside OpenAI’s quest to make AI do anything for you

Fashion isn’t the only fuss over ads generated by Vogue’s AI

Lina Khan points to Figma IPO as evidence of M&A scrutiny

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.