RondoDox Botnet Targets Critical React2Shell Vulnerability to Take Over IoT Devices and Web Servers

Published:

spot_img

Jan 01, 2026Ravie LakshmananNetwork Security / Vulnerability

Ongoing Campaign Targets IoT Devices via RondoDox Botnet

Cybersecurity experts have unveiled new details surrounding a prolonged attack campaign that has persisted for nine months, specifically targeting Internet of Things (IoT) devices and various web applications. This operation has been geared towards recruiting these devices into a botnet dubbed RondoDox.

Exploitation of the React2Shell Vulnerability

As of December 2025, findings from CloudSEK indicate that the RondoDox botnet is exploiting a significant security vulnerability known as React2Shell (CVE-2025-55182), which has been given a critical CVSS score of 10.0. This flaw is associated with React Server Components (RSC) and Next.js, enabling attackers without proper authentication to execute remote code on vulnerable devices.

Statistics from the Shadowserver Foundation reveal that approximately 90,300 devices remain vulnerable as of the end of December 2025. The majority of these vulnerable instances—about 68,400—are located in the United States, followed by Germany with 4,300, France at 2,800, and India comprising 1,500.

Expansion of RondoDox Capabilities

Emerging in early 2025, RondoDox has expanded its reach by integrating new N-day vulnerabilities into its toolkit, including CVE-2023-1389 and CVE-2025-24893. Notably, the exploitation of React2Shell for the botnet’s spread was previously reported by cybersecurity firms like Darktrace, Kaspersky, and VulnCheck.

Phases of the RondoDox Campaign

The RondoDox campaign appears to have progressed through three distinct stages leading up to the exploitation of CVE-2025-55182:

  1. March – April 2025: Initial reconnaissance and manual vulnerability scanning.
  2. April – June 2025: Aggressive daily probing of vulnerabilities in widely used web applications such as WordPress, Drupal, and Struts2, as well as IoT devices including Wavlink routers.
  3. July – Early December 2025: Transition to automated, large-scale deployment efforts occurring hourly.

Recent Attack Identifications

Recent attacks detected in December 2025 showed that threat actors launched scans specifically to pinpoint vulnerable Next.js servers. These scans were followed by attempts to deploy various malicious payloads, including cryptocurrency miners, a botnet loader, and a variant of the Mirai botnet.

One such loader, designated as /nuts/bolts, is engineered to eliminate competing cryptocurrencies and malware before it downloads the primary bot binary from its command-and-control (C2) server. This variant actively removes remnants of competing botnets and Docker-based payloads, cleans up previous campaign traces, and sets up ongoing persistence via cron jobs.

RondoDox’s monitoring capabilities enable it to continuously scan the /proc directory to identify running processes. It terminates any non-whitelisted processes roughly every 45 seconds, effectively thwarting efforts by rival actors aiming to reinfect compromised devices.

Recommendations for Enhancing Cybersecurity

To safeguard against the threats posed by the RondoDox botnet, organizations are strongly urged to adopt several preventive measures. These include ensuring that Next.js is promptly updated to a patched version, segmenting all IoT devices into dedicated VLANs, deploying Web Application Firewalls (WAFs), closely monitoring for suspicious process executions, and blocking known C2 infrastructure.

With the evolving landscape of cybersecurity threats, proactive measures are essential in mitigating vulnerabilities and protecting sensitive networks from exploitation.

spot_img

Related articles

Recent articles

Google’s Dark Web Monitoring Is Ending: Next Steps for You

Google is set to discontinue its dark web monitoring service designed to warn users about the exposure of personal information, such as names, email...

Understanding the Digital Trust Crisis: Why We Question Every Click

When Convenience Turns into Caution The internet was originally founded on a principle of trust: confidence that online transactions would be secure, personal identities would...

84 Hours of Internet Blackout in Iran Amid Growing Unrest

Iran's Internet Blackout: A Deepening Crisis Amid Unrest Four Days Without Connectivity Iran has plunged into a state of digital isolation as an internet blackout enters...

NSA Appoints Timothy Kosiba to Lead Cybersecurity Strategy

Appointment of Timothy Kosiba as NSA Deputy Director: A Leadership Milestone The National Security Agency (NSA) has recently announced a pivotal leadership change with the...