CISA Warns of Active Exploits Targeting WhatsApp, TP-Link Devices

CISA Adds High-Risk TP-Link and WhatsApp Vulnerabilities to Exploited Catalog, Urges Federal Agencies to Patch by September 2025

  • CISA added a high-risk vulnerability affecting TP-Link TL-WA855RE Wi-Fi Range Extenders to its Known Exploited Vulnerabilities catalog.
  • The security flaw, CVE-2020-24363, can let attackers gain control by resetting the device and setting a new admin password.
  • The problem has been fixed in an earlier firmware, but the device has reached end-of-life and will not get future updates.
  • A WhatsApp vulnerability (CVE-2025-55177), exploited in a targeted spyware campaign using an Apple OS flaw, was also added to the catalog.
  • Federal agencies must apply recommended fixes by September 23, 2025, to protect against ongoing threats.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two actively exploited security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog on September 2, 2025. The first flaw impacts the TP-Link TL-WA855RE Wi-Fi Range Extender. The second targets WhatsApp through a highly-targeted spyware attack chaining a related Apple operating system vulnerability.

- Advertisement -

CISA explained that the TP-Link vulnerability, tracked as CVE-2020-24363 with a CVSS score of 8.8, allows an attacker connected to the same network to send a specially crafted command. This command triggers a device reset, letting attackers set a new admin password and get unauthorized control. Firmware version TL-WA855RE(EU)_V5_200731 fixed the issue, but the product’s end-of-life status means no further patches are expected, according to malwrforensics.

CISA stated: “This vulnerability could allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password.” The agency advises users to replace outdated Wi-Fi range extenders to ensure proper security, as continued use increases risk.

The agency also added a WhatsApp vulnerability, CVE-2025-55177. Attackers chained this flaw with an Apple iOS, iPadOS, and macOS issue, CVE-2025-43300, to launch a spyware campaign. WhatsApp reported it notified fewer than 200 users who may have been targeted. Details on the perpetrators, methods, and scale remain undisclosed, but it is suspected a commercial surveillance vendor is behind the attack.

Federal Civilian Executive Branch agencies must apply all required mitigations by September 23, 2025, to reduce their exposure to these ongoing threats. Further details on the vulnerabilities and advisories are available from CISA.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Jeffy Yu, Crypto Founder Who Faked Death, Allegedly Dies

Crypto founder Jeffy Yu is alleged to have committed suicide in Roseville on New...

Unstable Ground: Looming U.S. Crypto Rules May Lack Legal Backing

SEC Chairman Paul Atkins is pushing for crypto rules but warns they need a...

Apple Stock Forms Technical Buy Point, Nears Breakout

Apple stock (AAPL) is forming a technical buy point and nearing a breakout, with...

LSEG to launch Digital Securities Sandbox for tokenization

London Stock Exchange Group (LSEG) plans to launch a Digital Securities Sandbox (DSD) this...

Tesla China Sales Slide in Jan., Exports Jump 71%

Tesla's retail sales in China plunged to 18,485 vehicles in January, their lowest monthly...

Must Read

Best Crypto Audiobooks of 2026: The Ultimate Listen & Learn Guide

You can't read Bitcoin charts while driving 70 mph on the highway. You can't study Ethereum whitepapers during your morning run. But you can...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!