選單換圖效果,請啟用Active Scripting功能
南臺首頁 English
:::
訪客 未來學生 本校學生 教職同仁 畢業校友
:::
  南臺頭條新聞
  南臺影音新聞
  所有訊息
  重要公告
  行政公告
  校園活動
  專案計劃
  研討會資訊
  校內徵才
  校園職場實習
  工作機會
  國際證照
  南臺新生
  招生資訊
  南臺RSS新聞
  本月公告一覽
  停刊公告活動欄
  [公告系統登入]


【行政公告】 ::: [ 上一頁 ]
 
公 告 單位
圖資處數位服務組
訊 息 類 別 行政公告 行政公告 公 告 對 象 全體
公 告 主 題
【資安漏洞預警】CISA新增3個已知遭駭客利用之漏洞至KEV目錄(2025/08/04-2025/08/10)
[Security Vulnerability Alert] CISA has added three known vulnerabilities to the KEV catalog (August 4-10, 2025)
公 告 內 容
轉發 台灣電腦網路危機處理暨協調中心 TWCERTCC-200-202508-00000006

[內容說明]
1.【CVE-2020-25078】D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability (CVSS v3.1: 7.5)
【是否遭勒索軟體利用:未知】 D-Link DCS-2530L和DCS-2670L裝置存在一個未具體說明的漏洞,可能導致遠端管理員密碼洩露。
【影響平台】請參考官方所列的影響版本
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10180

2.【CVE-2020-25079】D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability (CVSS v3.1: 8.8)
【是否遭勒索軟體利用:未知】 D-Link DCS-2530L和DCS-2670L裝置在cgi-bin/ddns_enc.cgi存在指令注入漏洞。
【影響平台】請參考官方所列的影響版本
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10180

3.【CVE-2022-40799】D-Link DNR-322L Download of Code Without Integrity Check Vulnerability (CVSS v3.1: 8.8)
【是否遭勒索軟體利用:未知】 D-Link DNR-322L存在下載程式碼時未進行完整性檢查漏洞,可能允許已驗證的攻擊者在裝置上執行作業系統層級的指令。
【影響平台】 D-Link DNR-322L 2.60B15(含)之前的版本

[影響平台]
詳細內容於內容說明欄之影響平台

[建議措施]
1.【CVE-2020-25078】
受影響的產品可能已達到產品生命週期終點(EoL)和/或終止服務(EoS)。建議使用者停止使用這些產品。

2.【CVE-2020-25079】
受影響的產品可能已達到產品生命週期終點(EoL)和/或終止服務(EoS)。建議使用者停止使用這些產品。

3.【CVE-2022-40799】
受影響的產品可能已達到產品生命週期終點(EoL)和/或終止服務(EoS)。建議使用者停止使用這些產品。

Forwarded by Taiwan Computer Network Crisis Response and Coordination Center (TWCERTCC-200-202508-00000006)

[Description]
1. [CVE-2020-25078] D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability (CVSS v3.1: 7.5)
[Exploited by ransomware: Unknown] D-Link DCS-2530L and DCS-2670L devices have an unspecified vulnerability that may lead to remote administrator password disclosure.
[Affected Platforms] Please refer to the official list of affected versions.
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10180

2. [CVE-2020-25079] D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability (CVSS v3.1: 8.8)
[Exploited by Ransomware: Unknown] The D-Link DCS-2530L and DCS-2670L devices have a command injection vulnerability in cgi-bin/ddns_enc.cgi.
[Affected Platforms] Please refer to the official list of affected versions.
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10180

3. [CVE-2022-40799] D-Link DNR-322L Download of Code Without Integrity Check Vulnerability (CVSS v3.1: 8.8)
[Exploited by Ransomware: Unknown] The D-Link DNR-322L has a vulnerability in code downloading without integrity checking, which could allow an authenticated attacker to execute operating system-level commands on the device.
[Affected Platforms] D-Link DNR-322L versions prior to 2.60B15

[Affected Platforms]
Details are in the Affected Platforms section of the Content Description column.

[Recommended Actions]
1. [CVE-2020-25078]
The affected products may have reached End of Life (EoL) and/or End of Service (EoS). Users are advised to discontinue use of these products.

2. [CVE-2020-25079]
The affected products may have reached End of Life (EoL) and/or End of Service (EoS). Users are advised to discontinue use of these products.

3. [CVE-2022-40799]
The affected products may have reached End of Life (EoL) and/or End of Service (EoS). Users are advised to discontinue use of these products.
相 關 訊 息


公 告 時 間
 2025/8/12   至 2026/2/12   
點 閱 次 數
32

:::
 
地址:71005 台南市永康區南台街一號 (開車訪客請由中正南路→正南一街→進入南臺科技大學) HyperLink