CrowdSec
7/10CrowdSec Score

D-Link - Information Disclosure (CVE-2020-25078)

Published on02-09-2020
First seen on19-09-2025

204Exploiting IPs reported

An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02 devices. The unauthenticated /config/getuser endpoint allows for remote administrator password disclosure.

CrowdSec analysis

CVE-2020-25078 is a vulnerability in certain D-Link camera models that exposes the administrator password via an unauthenticated /config/getuser endpoint. This flaw allows remote attackers to obtain sensitive credentials without authentication, potentially leading to full device compromise and unauthorized access to video feeds or device settings.

CrowdSec has been tracking this vulnerability and its exploits since 17th of September 2025.

Insights from the CrowdSec network reveal that the attackers trying to exploit CVE-2020-25078 are composed of a fairly even mix of opportunistic and targeted actors. Some attackers employ preliminary reconnaissance, while others use indiscriminate scanning. CrowdSec data also reveals a clear uptick in attacks involving CVE-2020-25078 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.

Attackers exploit the /config/getuser endpoint with the index=0 parameter to retrieve administrator credentials from vulnerable D-Link camera devices.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.