RondoDox Botnet Targets Critical React2Shell Vulnerability to Take Over IoT Devices and Web Servers

Published:

spot_img

Jan 01, 2026Ravie LakshmananNetwork Security / Vulnerability

Ongoing Campaign Targets IoT Devices via RondoDox Botnet

Cybersecurity experts have unveiled new details surrounding a prolonged attack campaign that has persisted for nine months, specifically targeting Internet of Things (IoT) devices and various web applications. This operation has been geared towards recruiting these devices into a botnet dubbed RondoDox.

Exploitation of the React2Shell Vulnerability

As of December 2025, findings from CloudSEK indicate that the RondoDox botnet is exploiting a significant security vulnerability known as React2Shell (CVE-2025-55182), which has been given a critical CVSS score of 10.0. This flaw is associated with React Server Components (RSC) and Next.js, enabling attackers without proper authentication to execute remote code on vulnerable devices.

Statistics from the Shadowserver Foundation reveal that approximately 90,300 devices remain vulnerable as of the end of December 2025. The majority of these vulnerable instances—about 68,400—are located in the United States, followed by Germany with 4,300, France at 2,800, and India comprising 1,500.

Expansion of RondoDox Capabilities

Emerging in early 2025, RondoDox has expanded its reach by integrating new N-day vulnerabilities into its toolkit, including CVE-2023-1389 and CVE-2025-24893. Notably, the exploitation of React2Shell for the botnet’s spread was previously reported by cybersecurity firms like Darktrace, Kaspersky, and VulnCheck.

Phases of the RondoDox Campaign

The RondoDox campaign appears to have progressed through three distinct stages leading up to the exploitation of CVE-2025-55182:

  1. March – April 2025: Initial reconnaissance and manual vulnerability scanning.
  2. April – June 2025: Aggressive daily probing of vulnerabilities in widely used web applications such as WordPress, Drupal, and Struts2, as well as IoT devices including Wavlink routers.
  3. July – Early December 2025: Transition to automated, large-scale deployment efforts occurring hourly.

Recent Attack Identifications

Recent attacks detected in December 2025 showed that threat actors launched scans specifically to pinpoint vulnerable Next.js servers. These scans were followed by attempts to deploy various malicious payloads, including cryptocurrency miners, a botnet loader, and a variant of the Mirai botnet.

One such loader, designated as /nuts/bolts, is engineered to eliminate competing cryptocurrencies and malware before it downloads the primary bot binary from its command-and-control (C2) server. This variant actively removes remnants of competing botnets and Docker-based payloads, cleans up previous campaign traces, and sets up ongoing persistence via cron jobs.

RondoDox’s monitoring capabilities enable it to continuously scan the /proc directory to identify running processes. It terminates any non-whitelisted processes roughly every 45 seconds, effectively thwarting efforts by rival actors aiming to reinfect compromised devices.

Recommendations for Enhancing Cybersecurity

To safeguard against the threats posed by the RondoDox botnet, organizations are strongly urged to adopt several preventive measures. These include ensuring that Next.js is promptly updated to a patched version, segmenting all IoT devices into dedicated VLANs, deploying Web Application Firewalls (WAFs), closely monitoring for suspicious process executions, and blocking known C2 infrastructure.

With the evolving landscape of cybersecurity threats, proactive measures are essential in mitigating vulnerabilities and protecting sensitive networks from exploitation.

spot_img

Related articles

Recent articles

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Scheme

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Scheme In a significant cybersecurity breach, Drift has disclosed that the attack on April 1,...

Mastermind Arrested as Delhi Police Uncover ₹300 Crore International Cyber Fraud Network

Mastermind Arrested as Delhi Police Uncover ₹300 Crore International Cyber Fraud Network A routine investigation into a single financial fraud complaint in New Delhi has...

UAE Warns: AI-Driven Phishing Scams Account for 90% of Cyber Breaches

UAE Warns: AI-Driven Phishing Scams Account for 90% of Cyber Breaches In a recent statement, the Cybersecurity Council of the UAE highlighted a troubling trend...

36 Malicious npm Packages Exploit Redis and PostgreSQL to Deploy Persistent Implants

36 Malicious npm Packages Exploit Redis and PostgreSQL to Deploy Persistent Implants Recent cybersecurity investigations have unveiled a significant threat within the npm registry, where...