The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple critical vulnerabilities affecting D-Link routers, cameras, and network video recorders to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation. These flaws, including one unpatched vulnerability, allow attackers to expose administrator passwords and execute commands remotely. One affected D-Link model has reached its end-of-life, increasing exposure risks for users who continue to operate it. In parallel, Dell has issued security patches addressing critical vulnerabilities impacting over 100 laptop models worldwide, which could allow attackers to take control of millions of devices. Users are urged to apply these fixes promptly to prevent potential cyberattacks. Additionally, Trend Micro has confirmed active exploitation of two critical remote code execution vulnerabilities (CVE-2025-54948 and CVE-2025-54987) in its Apex One on-premise management console, with a CVSS score of 9.4. These flaws enable attackers to run code before login, posing a severe risk to affected systems. Trend Micro and cybersecurity experts recommend immediate patching to mitigate these threats. Furthermore, security researchers have identified ReVault vulnerabilities that permit hackers to bypass Windows login on Dell laptops, compounding concerns over device security.
ReVault flaws let hackers bypass Windows login on Dell laptops https://t.co/cvv6w2IG6s
Attackers Are Targeting Critical Apex One Vulnerabilities, Trend Micro Warns https://t.co/LtvpgFqykQ
Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems https://t.co/5xerNs179B