Sep 03, 2025Ravie LakshmananVulnerability / Mobile Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity security flaw impacting TP-Link TL-WA855RE Wi-Fi Ranger Extender products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, CVE-2020-24363 (CVSS score: 8.8), concerns a case of missing authentication that could be abused to obtain elevated …
Read More »Tag Archives: Exploitation
WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately – The Hacker News
WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately The Hacker News WinRAR zero-day exploited to plant malware on archive extraction BleepingComputer Newly discovered WinRAR exploit linked to Russian hacking group, can plant backdoor malware — zero day hack requires manual update to fix Tom’s Hardware Patch Now: New WinRAR Flaw Used to Deliver Malware PCMag Phishing attacks exploit WinRAR flaw CVE-2025-8088 …
Read More »Disrupting active exploitation of on-premises SharePoint vulnerabilities
On July 19, 2025, Microsoft Security Response Center (MSRC) published a blog addressing active attacks against on-premises SharePoint servers that exploit CVE-2025-49706, a spoofing vulnerability, and CVE-2025-49704, a remote code execution vulnerability. These vulnerabilities affect on-premises SharePoint servers only and do not affect SharePoint Online in Microsoft 365. Microsoft has released new comprehensive security updates for all supported versions of …
Read More »Microsoft Releases Guidance on Exploitation of SharePoint Vulnerability (CVE-2025-53770)
CISA is aware of active exploitation of a new remote code execution (RCE) vulnerability enabling unauthorized access to on-premise SharePoint servers. While the scope and impact continue to be assessed, the new Common Vulnerabilities and Exposures (CVE), CVE-2025-53770, is a variant of the existing vulnerability CVE-2025-49706 and poses a risk to organizations. This exploitation activity, publicly reported as “ToolShell,” provides unauthenticated access to …
Read More »