Close Menu
    Latest Post

    Edifier S880DB MKII Speakers: Feature-Rich with a Minor Bass Limitation

    January 7, 2026

    Medium’s CEO Details Path to Profitability After $2.6M Monthly Losses

    January 7, 2026

    Meta Acquires Chinese-Founded AI Startup Manus

    January 7, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Edifier S880DB MKII Speakers: Feature-Rich with a Minor Bass Limitation
    • Medium’s CEO Details Path to Profitability After $2.6M Monthly Losses
    • Meta Acquires Chinese-Founded AI Startup Manus
    • Design System Annotations: Why Accessibility is Often Overlooked in Component Design (Part 1)
    • The Red-Teaming Resistance Leaderboard: Evaluating LLM Safety
    • Automating Your DevOps: Writing Scripts that Save Time and Headaches
    • The Most Overlooked Way to Stop Spam Calls on Android and iPhone
    • SteelSeries Arctis Nova 7P Gen 2 review: a highly versatile headset that’s become a daily driver
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Security»RondoDox Botnet Exploits React2Shell Flaw to Breach Next.js Servers
    Security

    RondoDox Botnet Exploits React2Shell Flaw to Breach Next.js Servers

    Samuel AlejandroBy Samuel AlejandroJanuary 1, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src 8gd0cx featured
    Share
    Facebook Twitter LinkedIn Pinterest Email

    RondoDox botnet exploits React2Shell flaw to breach Next.js servers

    The RondoDox botnet is reportedly leveraging the critical React2Shell vulnerability (CVE-2025-55182) to compromise Next.js servers, deploying malware and cryptominers.

    Fortinet initially documented RondoDox in July 2025 as a significant botnet known for exploiting various n-day vulnerabilities worldwide. More recently, in November, VulnCheck identified new RondoDox versions incorporating exploits for CVE-2025-24893, a critical remote code execution flaw in the XWiki Platform.

    According to a recent report by cybersecurity company CloudSEK, the RondoDox botnet initiated scans for vulnerable Next.js servers on December 8, subsequently deploying botnet clients starting three days later.

    React2Shell is an unauthenticated remote code execution (RCE) vulnerability. It can be exploited with a single HTTP request and impacts all frameworks utilizing the React Server Components (RSC) ‘Flight’ protocol, such as Next.js.

    This vulnerability has been exploited by various threat actors to compromise numerous organizations. Notably, North Korean hackers have used React2Shell to deploy a new malware family known as EtherRAT.

    As of December 30, the Shadowserver Foundation has reported identifying more than 94,000 internet-exposed assets susceptible to the React2Shell vulnerability.

    CloudSEK indicates that RondoDox has undergone three distinct operational phases throughout the current year:

    • Reconnaissance and vulnerability testing from March to April 2025
    • Automated web app exploitation from April to June 2025
    • Large-scale IoT botnet deployment from July to today

    Researchers note that RondoDox has recently intensified its exploitation efforts targeting React2Shell, conducting over 40 exploit attempts within a six-day period in December.

    In this operational phase, the botnet performs hourly IoT exploitation waves, specifically targeting Linksys, Wavlink, and other consumer and enterprise routers to enlist new bots.

    CloudSEK states that after identifying potentially vulnerable servers, RondoDox began deploying payloads such as a coinminer (/nuts/poop), a botnet loader and health checker (/nuts/bolts), and a Mirai variant (/nuts/x86).

    The ‘bolts’ component is designed to remove rival botnet malware from the compromised host, establish persistence through /etc/crontab, and terminate non-whitelisted processes every 45 seconds, according to researchers.

    CloudSEK offers recommendations for organizations to defend against RondoDox activity. These include auditing and patching Next.js Server Actions, isolating IoT devices into dedicated virtual LANs, and monitoring for suspicious process executions.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleTwo Cybersecurity Employees Plead Guilty to Ransomware Attacks
    Next Article How a Smart Garden Cultivated Success for a Novice Gardener
    Samuel Alejandro

    Related Posts

    Security

    KrebsOnSecurity.com Marks 16 Years of Cybersecurity Reporting

    January 7, 2026
    Startups

    Rami Al Idrissi: A Leader in SCADA, Cybersecurity, and Renewable Energy

    January 7, 2026
    Security

    ICE Seeks Enhanced Cyber Surveillance for Employee Investigations

    January 6, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202512 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202510 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    Edifier S880DB MKII Speakers: Feature-Rich with a Minor Bass Limitation

    January 7, 20260 Views

    Medium’s CEO Details Path to Profitability After $2.6M Monthly Losses

    January 7, 20260 Views

    Meta Acquires Chinese-Founded AI Startup Manus

    January 7, 20260 Views
    Recent Posts
    • Edifier S880DB MKII Speakers: Feature-Rich with a Minor Bass Limitation
    • Medium’s CEO Details Path to Profitability After $2.6M Monthly Losses
    • Meta Acquires Chinese-Founded AI Startup Manus
    • Design System Annotations: Why Accessibility is Often Overlooked in Component Design (Part 1)
    • The Red-Teaming Resistance Leaderboard: Evaluating LLM Safety
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.