Skip to content
Tech News
← Back to articles

New Mirai campaign exploits RCE flaw in EoL D-Link routers

read original get D-Link Router Security Patch → more articles
Why This Matters

The active exploitation of the CVE-2025-29635 vulnerability in D-Link routers highlights the ongoing risks of unpatched IoT devices being hijacked into botnets like Mirai. This underscores the importance for consumers and the industry to prioritize timely firmware updates and security awareness to prevent widespread device compromise. The campaign also demonstrates how attackers rapidly leverage known vulnerabilities to expand their malicious networks, posing significant threats to network stability and security.

Key Takeaways

A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.

CVE-2025-29635 allows an attacker to execute arbitrary commands on remote devices by sending a POST request to a vulnerable endpoint, triggering remote command execution (RCE).

Akamai's SIRT, which detected the Mirai campaign in March 2026, reports that, although the flaw was first disclosed 13 months ago by security researchers Wang Jinshuai and Zhao Jiangting, this is the first time in-the-wild active exploitation has been observed.

"The Akamai SIRT discovered active exploitation attempts of the D-Link command injection vulnerability CVE-2025-29635 in our global network of honeypots in early March 2026," reads Akamai's report.

"This vulnerability exists in D-Link DIR-823X series routers in firmware versions 240126 and 24082, and allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to the /goform/set_prohibiting endpoint via the corresponding function, which can trigger remote command execution."

The researchers who discovered the flaw briefly published a proof-of-concept (PoC) exploit on GitHub, but later retracted it.

Akamai's observations show attackers are sending POST requests that change directories across writable paths, download a shell script (dlink.sh) from an external IP, and execute it.

The observed POST requests

Source: Akamai

The script installs a Mirai-based malware named "tuxnokill," which supports multiple architectures.

... continue reading