Close Menu
    Latest Post

    AI Wrapped: The 14 AI terms you couldn’t avoid in 2025

    January 6, 2026

    GPT Function Calling: 5 Underrated Use Cases

    January 6, 2026

    Stop using the wrong Gemini: The one setting you need to change for Gemini 3

    January 6, 2026
    Facebook X (Twitter) Instagram
    Trending
    • AI Wrapped: The 14 AI terms you couldn’t avoid in 2025
    • GPT Function Calling: 5 Underrated Use Cases
    • Stop using the wrong Gemini: The one setting you need to change for Gemini 3
    • Coros Nomad Review: A Robust and Affordable Outdoor Smartwatch
    • ICE Seeks Enhanced Cyber Surveillance for Employee Investigations
    • Fun graph from Peter Attia’s book Outlive
    • UK Social Media Campaigners Among Five Denied US Visas
    • Enhancing HDR on Instagram for iOS With Dolby Vision
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Security»RondoDox Botnet Exploits React2Shell Flaw to Breach Next.js Servers
    Security

    RondoDox Botnet Exploits React2Shell Flaw to Breach Next.js Servers

    Samuel AlejandroBy Samuel AlejandroJanuary 1, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src 8gd0cx featured
    Share
    Facebook Twitter LinkedIn Pinterest Email

    RondoDox botnet exploits React2Shell flaw to breach Next.js servers

    The RondoDox botnet is reportedly leveraging the critical React2Shell vulnerability (CVE-2025-55182) to compromise Next.js servers, deploying malware and cryptominers.

    Fortinet initially documented RondoDox in July 2025 as a significant botnet known for exploiting various n-day vulnerabilities worldwide. More recently, in November, VulnCheck identified new RondoDox versions incorporating exploits for CVE-2025-24893, a critical remote code execution flaw in the XWiki Platform.

    According to a recent report by cybersecurity company CloudSEK, the RondoDox botnet initiated scans for vulnerable Next.js servers on December 8, subsequently deploying botnet clients starting three days later.

    React2Shell is an unauthenticated remote code execution (RCE) vulnerability. It can be exploited with a single HTTP request and impacts all frameworks utilizing the React Server Components (RSC) ‘Flight’ protocol, such as Next.js.

    This vulnerability has been exploited by various threat actors to compromise numerous organizations. Notably, North Korean hackers have used React2Shell to deploy a new malware family known as EtherRAT.

    As of December 30, the Shadowserver Foundation has reported identifying more than 94,000 internet-exposed assets susceptible to the React2Shell vulnerability.

    CloudSEK indicates that RondoDox has undergone three distinct operational phases throughout the current year:

    • Reconnaissance and vulnerability testing from March to April 2025
    • Automated web app exploitation from April to June 2025
    • Large-scale IoT botnet deployment from July to today

    Researchers note that RondoDox has recently intensified its exploitation efforts targeting React2Shell, conducting over 40 exploit attempts within a six-day period in December.

    In this operational phase, the botnet performs hourly IoT exploitation waves, specifically targeting Linksys, Wavlink, and other consumer and enterprise routers to enlist new bots.

    CloudSEK states that after identifying potentially vulnerable servers, RondoDox began deploying payloads such as a coinminer (/nuts/poop), a botnet loader and health checker (/nuts/bolts), and a Mirai variant (/nuts/x86).

    The ‘bolts’ component is designed to remove rival botnet malware from the compromised host, establish persistence through /etc/crontab, and terminate non-whitelisted processes every 45 seconds, according to researchers.

    CloudSEK offers recommendations for organizations to defend against RondoDox activity. These include auditing and patching Next.js Server Actions, isolating IoT devices into dedicated virtual LANs, and monitoring for suspicious process executions.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleTwo Cybersecurity Employees Plead Guilty to Ransomware Attacks
    Next Article How a Smart Garden Cultivated Success for a Novice Gardener
    Samuel Alejandro

    Related Posts

    Security

    ICE Seeks Enhanced Cyber Surveillance for Employee Investigations

    January 6, 2026
    Security

    Nearly 480,000 impacted by Covenant Health data breach

    January 5, 2026
    Security

    SMS Phishing Scams Evolve: Targeting Rewards Points, Tax Refunds, and Fake Online Stores

    January 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202512 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202510 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    AI Wrapped: The 14 AI terms you couldn’t avoid in 2025

    January 6, 20260 Views

    GPT Function Calling: 5 Underrated Use Cases

    January 6, 20260 Views

    Stop using the wrong Gemini: The one setting you need to change for Gemini 3

    January 6, 20260 Views
    Recent Posts
    • AI Wrapped: The 14 AI terms you couldn’t avoid in 2025
    • GPT Function Calling: 5 Underrated Use Cases
    • Stop using the wrong Gemini: The one setting you need to change for Gemini 3
    • Coros Nomad Review: A Robust and Affordable Outdoor Smartwatch
    • ICE Seeks Enhanced Cyber Surveillance for Employee Investigations
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.