React2Shell Vulnerability Exploited by RondoDox Botnet for Malware and Cryptojacking Attacks
- Jan 1
- 2 min read
Key Findings
The RondoDox botnet is exploiting the critical React2Shell vulnerability (CVE-2025-55182) to infect vulnerable Next.js servers with malware and cryptominers.
The RondoDox botnet has been active since 2024 and has evolved through three phases: reconnaissance and vulnerability testing, automated web application exploitation, and large-scale IoT botnet deployment.
The botnet now runs hourly IoT exploitation waves targeting routers from vendors like Linksys and Wavlink, deploying payloads including a cryptominer, a botnet loader and health checker, and a Mirai variant.
The attack campaign has been observed launching over 40 exploit attempts against the React2Shell flaw in a six-day period.
Background
Active since 2024, the RondoDox botnet uses custom libraries and mimics gaming or VPN traffic to evade detection. In July 2024, FortiGuard Labs first spotted the botnet exploiting CVE-2024-3721 and CVE-2024-12856. In October 2025, Trend Micro researchers reported that RondoDox exploits 56 known flaws in over 30 device types, including DVRs, NVRs, CCTV systems, and web servers.
React2Shell Vulnerability
The React2Shell vulnerability (CVE-2025-55182) is a critical pre-authentication remote code execution flaw in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0. The vulnerability allows unauthenticated attackers to execute arbitrary code by exploiting unsafe payload decoding in Server Function endpoints.
RondoDox Botnet Campaign
March - April 2025: Initial reconnaissance and manual vulnerability scanning
April - June 2025: Daily mass vulnerability probing of web applications and IoT devices
July - early December 2025: Hourly automated deployment on a large-scale
December 2025: Scanning for vulnerable Next.js servers and deploying malicious payloads, including a cryptominer, a botnet loader and health checker, and a Mirai variant
Defensive Recommendations
Urgently audit Next.js apps, especially Server Actions, and apply patches or temporary disablement
Isolate and harden IoT devices, deploy Web Application Firewalls (WAFs), and block known C2 infrastructure
Enhance network and behavioral monitoring, enforce zero-trust access for admin interfaces, and maintain continuous vulnerability and patch management with threat intelligence and regular testing.
Sources
https://securityaffairs.com/186386/uncategorized/react2shell-under-attack-rondodox-botnet-spreads-miners-and-malware.html
https://thehackernews.com/2026/01/rondodox-botnet-exploits-critical.html


Comments