Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Rivian is developing its own AI assistant

Three in 10 US teens use AI chatbots daily, but safety concerns are growing

Slack CEO Dennis Dresser joins OpenAI as chief revenue officer

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » TP-Link router defective CVE-2023-33538 Under active exploits, CISA will issue alerts immediately
Identity

TP-Link router defective CVE-2023-33538 Under active exploits, CISA will issue alerts immediately

userBy userJune 17, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 17, 2025Ravi LakshmananNetwork Security / IoT Security

TP-Link router defects

The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added high-strength security flaws in TP-Link wireless routers to its known Exploited Vulnerabilities (KEV) catalogue, citing evidence of aggressive exploitation.

The vulnerability in question is CVE-2023-33538 (CVSS score: 8.8). This is a command injection bug that could cause arbitrary system commands to be executed when processing SSID1 parameters in a specially created HTTP GET request.

“TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 contain command injection vulnerabilities via component/USERRPM/WLANNETWORKRPM.”

Cybersecurity

CISA also warns that the affected products may be end-of-life (EOL) and/or termination of service (EOS), urging users to discontinue use if mitigation is not available.

Currently there is no public information on how the flaws are exploited in the wild.

In December 2024, Palo Alto Networks Unit 42 identified an additional sample of malware centered around an operational technology (OT) called Frostygooop (aka Bustleberm), and revealed that one of the IP addresses corresponding to the ENCO controlled devices acted as a Router web server using the TP link WR740N, accessed from the ENCO device from the Web Browser.

However, it furthermore, “There is no difficult evidence that the attacker exploited it [CVE-2023-33538] In July 2024, Frostigup attacks. ”

Hacker news has been contacted TP-Link for more details. If you’ve heard of it, update the story. In light of active exploitation, federal agencies must fix the defects by July 7, 2025.

The new activity is targeting CVE-2023-28771

Disclosure occurs as Greynoise warned of attempts to exploit targeting critical security flaws affecting the Zyxel firewall (CVE-2023-28771, CVSS score: 9.8).

CVE-2023-28771 refers to a vulnerability in other operating system command injection. This allows unauthorized attackers to execute commands by sending craft requests to sensitive devices. Zyxel applied the patch in April 2023.

The vulnerability was weaponized to build a DDOS botnet such as Mirai shortly after its public disclosure, but the threat intelligence company said it had discovered a growing attempt to exploit it in the same way as on June 16, 2025.

Cybersecurity

As many as 244 unique IP addresses are said to have participated in a short effort, with activities targeting the US, UK, Spain, Germany and India.

“Historical analysis shows that two weeks before June 16th, these IPs were not observed to be engaged in other scans or misuse behaviors, saying they were targeting CVE-2023-28771 only.

To mitigate threats, users are advised to update their Zyxel devices to the latest version, monitor for unusual activity, and limit exposure if applicable.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePFAS blood tests reveal high levels of exposure in the US
Next Article UK aerospace has secured a £250 million boost to drive the green revolution
user
  • Website

Related Posts

North Korea-linked attackers exploit React2Shell to deploy new EtherRAT malware

December 9, 2025

Four threat clusters use CastleLoader as GrayBravo expands its malware services infrastructure

December 9, 2025

Storm-0249 Using ClickFix, Fileless PowerShell, and DLL Sideloading to Escalate Ransomware Attacks

December 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Rivian is developing its own AI assistant

Three in 10 US teens use AI chatbots daily, but safety concerns are growing

Slack CEO Dennis Dresser joins OpenAI as chief revenue officer

Boom Supersonic raises $300 million to build natural gas turbines for Crusoe data center

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.