CVE Alert: CVE-2020-25078 – n/a – n/a

CVE-2020-25078

UnknownCISA KEVExploitation active

An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02 devices. The unauthenticated /config/getuser endpoint allows for remote administrator password disclosure.

CVSS v3.1 not provided
Vendor
n/a
Product
n/a
Versions
n/a
CWE
n/a
Vector
n a
Published
2020-09-02T15:33:18.000Z
Updated
2025-08-05T22:20:24.059Z

AI Summary Analysis

Risk verdict

High risk with active exploitation signals; treat as priority 1 due to KEV listing and SSVC indicating exploitation is active.

Why this matters

Unauthenticated access to the admin password enables full control of the affected cameras, potentially exposing video streams and tampering with device settings. In practice, attackers could pivot within the network to compromise adjacent devices or exfiltrate sensitive surveillance data, impacting confidentiality and operations.

Most likely attack path

An unauthenticated remote attacker can reach a network-facing /config/getuser endpoint, retrieve the administrator password, and log into the device with high privileges. No user interaction or credentials are required, so exploitation is straightforward in exposed deployments, enabling rapid post-exploit moves within the local network.

Who is most exposed

D-Link DCS-2530L and DCS-2670L cameras in SMB/enterprise or consumer environments where remote admin endpoints are reachable from the LAN or Internet-facing networks, especially with weak segmentation or default access configurations.

Detection ideas

  • Unusual, repeated unauthenticated requests to /config/getuser from network sources.
  • Admin password material appearing in responses or unexpected access tokens.
  • Unauthorised changes to admin accounts or passwords.
  • Traffic spikes to device management interfaces outside normal maintenance windows.
  • Firmware/version queries or unexpected device reboots tied to admin events.

Mitigation and prioritisation

  • Apply latest firmware: 1.06.01 Hotfix (2530L) or 2.02 (2670L) promptly.
  • If patching is not feasible, restrict admin access with firewall/VPN, disable remote admin where possible, and segment cameras from critical networks.
  • Rotate admin credentials after patching; enforce strong, unique passwords.
  • Monitor for /config/getuser activity and alert on anomalous management traffic.
  • Change-management: test patches in a lab, schedule a controlled rollout, and document compensating controls. Treat as priority 1 due to KEV and active exploitation signals.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.