Cybersecurity Chaos: CISA’s New Entries in the Vulnerability Hall of Shame

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added new vulnerabilities to its Known Exploited Vulnerabilities catalog. Among the culprits, D-Link DIR-859 routers join the list, proving once again that not even outdated WiFi routers are safe from the clutches of cyber mischief. Stay secure, update when possible!

Pro Dashboard

Hot Take:

Looks like the cyber villains have hit the jackpot again, this time with some outdated routers and security systems that might as well have been wearing a “kick me” sign. It’s like finding treasure in a junkyard—except this junk is your outdated tech, and the treasure is your personal data. Time to upgrade, folks! Or maybe just hide in a digital bunker until the storm passes.

Key Points:

  • CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities (KEV) catalog.
  • D-Link DIR-859 router is vulnerable to a path traversal attack that can leak user credentials.
  • The D-Link DIR-859 is no longer supported, which means no official fix is coming.
  • Hackers are exploiting these vulnerabilities to gain unauthorized access to sensitive information.
  • CISA mandates federal agencies to patch these vulnerabilities by July 16, 2025.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?