CISA Includes TP-Link and WhatsApp Vulnerabilities in KEV Catalog Due to Ongoing Exploitation
On September 3, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced the addition of a critical security vulnerability related to TP-Link TL-WA855RE Wi-Fi Ranger Extenders to its Known Exploited Vulnerabilities (KEV) catalog. This decision comes in light of evidence indicating active exploitation of the flaw, which has been assigned the identifier CVE-2020-24363 and carries a CVSS score of 8.8.
The vulnerability arises from a failure to implement proper authentication, thereby allowing unauthorized access to affected devices. Specifically, an attacker connected to the same local network could exploit this weakness by sending a TDDP_RESET POST request. This would enable the attacker to perform a factory reset on the device and subsequently set a new administrative password, thus bypassing access controls. CISA’s advisory underscores the severity of this risk, highlighting the potential for unauthorized parties to gain significant control over the network.
According to malwrforensics, a fix is available in the firmware update TL-WA855RE(EU)_V5_200731. However, it is important to note that this particular model has reached end-of-life (EoL) status, which raises concerns about the availability of future patches or updates. Users of the Wi-Fi range extender should be aware that the risks associated with the vulnerability remain pertinent given the lack of ongoing support for the product.
In addition to the vulnerabilities identified with TP-Link, CISA also drew attention to security flaws impacting WhatsApp, further indicating a broader landscape of vulnerabilities that could be exploited by malicious actors. These developments emphasize the necessity for organizations to remain vigilant and proactive in addressing security weaknesses within their digital infrastructure.
The ongoing exploitation of these vulnerabilities suggests that adversarial tactics may include initial access methodologies, such as exploiting misconfigured devices or exploiting known vulnerabilities in software applications. Techniques related to privilege escalation are also relevant, as attackers aim to elevate their permissions and gain unauthorized control within organizational networks.
As businesses increasingly rely on interconnected devices for operations, the implications of such vulnerabilities underscore the critical importance of maintaining an updated cybersecurity posture. Employing rigorous security measures, including regular firmware updates and proactive monitoring for signs of compromise, is now more crucial than ever for organizations seeking to mitigate the risks posed by these evolving threats.
CISA’s inclusion of these vulnerabilities in its KEV catalog serves as a timely reminder of the ongoing threats within the cybersecurity landscape. It reinforces the imperative for business owners to prioritize their cybersecurity strategies, ensuring that they are equipped to defend against both known and emerging vulnerabilities.