VulnerabilitiesHIGH

Vulnerabilities Disclosed - TP-Link, Canva, and HikVision

TACisco Talos Intelligence
CVE-2025-64776CVE-2025-62673CVE-2025-66176TP-LinkCanva
🎯

Basically, there were security holes found in popular tech products that could let hackers in.

Quick Summary

Cisco Talos has disclosed vulnerabilities in TP-Link, Canva, and HikVision products. These flaws could lead to serious security risks. Make sure to update your devices to stay protected.

What Happened

Recently, Cisco Talos’ Vulnerability Discovery & Research team unveiled a series of vulnerabilities affecting TP-Link, Canva, and HikVision products. In total, there are 10 vulnerabilities in TP-Link, 19 in Canva, and 1 in HikVision. These vulnerabilities have been patched by the respective vendors, following Cisco’s third-party vulnerability disclosure policy, ensuring that users can protect their devices.

The vulnerabilities range from buffer overflows to out-of-bounds reads, which can lead to severe security risks, including remote code execution and unauthorized access to sensitive data. The proactive measures taken by the vendors to patch these vulnerabilities highlight the importance of timely updates in maintaining cybersecurity.

Who's Affected

The vulnerabilities primarily affect users of TP-Link routers, Canva Affinity, and HikVision surveillance systems. Anyone using these products should be aware of the potential risks associated with these vulnerabilities.

For instance, TP-Link users of the Archer AX53 router may face issues due to stack-based buffer overflow vulnerabilities that could allow attackers to execute arbitrary code. Canva users could be at risk of sensitive data exposure through out-of-bounds read vulnerabilities. HikVision's users, particularly those utilizing their Ultra Face Recognition Terminals, may also be vulnerable to remote code execution attacks.

What Data Was Exposed

The vulnerabilities discovered in these products could potentially expose sensitive user data. For Canva, out-of-bounds read vulnerabilities could lead to the disclosure of sensitive information contained within graphic files. In TP-Link's case, attackers could exploit buffer overflow vulnerabilities to gain unauthorized access to the router's functionalities, potentially compromising the entire network.

HikVision's vulnerability allows attackers to send malicious packets, which could lead to remote code execution, putting surveillance data and user privacy at risk. The implications of these vulnerabilities could be severe, making it critical for users to apply the patches provided by the vendors.

What You Should Do

To mitigate the risks associated with these vulnerabilities, users should immediately update their devices to the latest firmware provided by TP-Link, Canva, and HikVision. Regularly checking for updates and applying them promptly is essential for maintaining security.

Additionally, users should monitor their network traffic for any unusual activity that could indicate exploitation attempts. For those using Canva, be cautious when handling EMF files, as they may be used to exploit the identified vulnerabilities. By staying informed and proactive, users can significantly reduce their risk of falling victim to these vulnerabilities.

🔒 Pro insight: The diverse nature of these vulnerabilities highlights the ongoing need for robust security practices across popular consumer technologies.

Original article from

Cisco Talos Intelligence · Kri Dontje

Read Full Article

Related Pings

HIGHVulnerabilities

Grafana Vulnerabilities - Critical Security Advisory Issued

Grafana has issued a critical security advisory for older versions. Users must update to avoid serious vulnerabilities. Acting now is essential for safeguarding data integrity.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

ABB Security Advisory - Addressing Camera Connect Vulnerabilities

ABB issued a security advisory for vulnerabilities in their camera software. Users must upgrade to avoid potential exploitation. This is crucial for maintaining security in connected systems.

Canadian Cyber Centre Alerts·
CRITICALVulnerabilities

Langflow Vulnerability - Critical Flaw Actively Exploited

CISA warns of a critical vulnerability in Langflow, CVE-2026-33017, allowing hackers to hijack AI workflows. Users must upgrade or restrict access by April 8 to mitigate risks. This flaw poses significant threats to data and operations.

BleepingComputer·
HIGHVulnerabilities

Squid Security Advisory - High-Risk Vulnerabilities Found

Squid has announced critical vulnerabilities in their software that could lead to Denial of Service attacks. Users must update to version 7.5 to avoid disruptions. Don't let your systems be at risk—act now!

Canadian Cyber Centre Alerts·
CRITICALVulnerabilities

CVE-2026-33634 - Critical Vulnerability Added to CISA Catalog

CISA has added a new critical vulnerability to its KEV Catalog. CVE-2026-33634 affects Aqua Security's Trivy, posing risks to federal networks. Organizations must act quickly to mitigate potential threats.

CISA Advisories·
HIGHVulnerabilities

iOS 26 Security - Leaked Tools Expose Millions to Spyware

Leaked hacking tools put millions of older iPhones at risk. Cybersecurity experts warn that outdated devices are vulnerable to spyware attacks. Users must update their software to stay safe.

TechCrunch Security·