React2Shell Vulnerability (CVE-2025-55182) Leveraged by RondoDox Botnet Against IoT Devices

Summary :

The RondoDox botnet is actively exploiting a critical vulnerability tracked as React2Shell (CVE-2025-55182) to compromise exposed web servers and Internet of Things (IoT) devices. The flaw enables unauthenticated remote code execution in vulnerable Next.js and React Server Components (RSC) deployments, facilitating large-scale botnet enrollment and persistent compromise of the system. Observed activity indicates that threat actors are leveraging this vulnerability along with additional weaknesses to deploy modular botnet loaders, cryptocurrency miners, and Mirai-derived malware variants designed to maintain long-term control and suppress competing infections. Organizations operating unpatched React-based applications or exposed IoT infrastructure face elevated risk due to the ongoing, automated exploitation of this vulnerability.

Technical Description :

React2Shell (CVE-2025-55182) is a remote code execution vulnerability affecting Next.js and React Server Components (RSC) that arises from improper handling of user-supplied input during server-side request processing. The vulnerability enables unauthenticated attackers to execute arbitrary commands by interacting with exposed application endpoints that do not adequately enforce input validation. With a CVSS score of 10.0, successful exploitation provides attackers with command execution within the context of the vulnerable server process, enabling the deployment of secondary payloads without requiring authentication or elevated privileges.

Exploitation is carried out through crafted HTTP requests sent to susceptible React or Next.js endpoints, resulting in the execution of attacker-controlled commands. RondoDox operators leverage this execution path to deploy follow-on malware components, including botnet agents and cryptocurrency mining payloads, establishing initial access to compromised web servers and Internet of Things (IoT) devices.

Following exploitation, the RondoDox botnet establishes persistence through a staged infection workflow. The observed attack lifecycle begins with reconnaissance and vulnerability identification, followed by automated exploitation and payload delivery. Command-and-control (C2) infrastructure distributes multiple payload types, including a proprietary malware loader referred to as nuts/bolts, along with cryptocurrency mining components used to monetize compromised systems.

The nuts/bolts loader establishes persistence by modifying crontab entries to ensure execution across system reboots. It enforces process-level control by periodically enumerating active processes and terminating non-whitelisted entries, including competing botnet agents and unauthorized cryptocurrency miners. Process enforcement is performed at regular intervals, observed at approximately every 45 seconds in analyzed samples, which suppresses rival infections and increases the likelihood that RondoDox retains exclusive control over compromised hosts.

CVE ID CVSS Score Vulnerability Type Affected Products Remediation
CVE-2025-55182 10.0 (Critical) Remote Code Execution (RCE) React Server Components (RSC), Next.js Upgrade to the Latest Patched Version

In addition to persistence mechanisms, RondoDox employs self-protection techniques to reinforce its operational foothold. The nuts/bolts loader regularly monitors the system process list and terminates processes that do not conform to predefined allowlists, reducing the effectiveness of competing malware and interfering with certain defensive tooling. This approach increases the dwell time of the botnet on infected systems.

To expand its operational footprint, the botnet incorporates Mirai-derived malware variants that exploit known vulnerabilities in IoT devices, including routers and embedded systems. After initial compromise, infected hosts are used to scan for additional vulnerable Next.js servers and IoT devices, facilitating continued botnet growth. The combination of proprietary loaders and reused exploitation techniques allows the botnet to adapt its operations and sustain activity across diverse environments.

Exploitation Demonstration:

Threat actors exploit the React2Shell (CVE-2025-55182) vulnerability in exposed Next.js or React Server Components to achieve unauthenticated remote code execution.
• Successful exploitation is followed by the deployment of malicious payloads, including cryptocurrency mining components and a proprietary botnet loader referred to as nuts/bolts.
• The nuts/bolts loader establishes persistence by modifying crontab entries to ensure that core botnet components remain active across system reboots.
• Process-level control is enforced through continuous enumeration and termination of non-whitelisted processes, suppressing competing malware and limiting reinfection by rival operators.
• Compromised systems are subsequently used to identify and exploit additional vulnerable IoT devices and Next.js servers, expanding botnet membership and operational reach.

Ease of Exploitation:

React2Shell (CVE-2025-55182) presents a low-barrier exploitation pathway due to its unauthenticated nature and the absence of prerequisite access or elevated privileges. The vulnerability can be triggered through crafted HTTP requests targeting exposed application endpoints, enabling automated exploitation at scale. Given the widespread adoption of Next.js and React Server Components across modern web environments, the vulnerability significantly expands the available attack surface. Once exploited, affected systems can be rapidly integrated into botnet infrastructure through automated payload deployment, supporting high-volume and repeatable exploitation campaigns.

Conclusion:

The active exploitation of React2Shell (CVE-2025-55182) by the RondoDox botnet underscores the risk posed by unauthenticated remote code execution vulnerabilities in widely deployed web frameworks. By combining automated exploitation with persistent loaders, self-defense mechanisms, and Mirai-derived propagation techniques, RondoDox demonstrates an operational approach focused on scalability, resilience, and long-term control of compromised infrastructure. Organizations operating vulnerable Next.js applications or exposed IoT devices face an increased likelihood of sustained compromise unless mitigations are promptly applied.

Impact :

The exploitation of React2Shell (CVE-2025-55182) enables RondoDox operators to establish persistent control over affected web servers and Internet of Things (IoT) devices, converting them into nodes for resource hijacking, distributed denial-of-service (DDoS) activity, and cryptocurrency mining. Compromised systems may serve as long-lived points of attack, increasing the likelihood of sustained operational disruption and unauthorized infrastructure use. The botnet’s ability to propagate laterally, suppress competing malware, and reduce forensic visibility extends the potential impact across interconnected environments, elevating the risk of broader infrastructure abuse and reputational damage for affected organizations.

IOC & Context Table :

Topics Details
Tactic Name Initial Access, Execution, Persistence, Privilege Escalation, Command and Control, Impact
Technique Name Exploitation of Vulnerability
Exploitation of Remote Services
Software Vulnerability Exploitation
Command-Line Interface
Persistence via Cron Jobs
Sub Technique Name Exploitation of React2Shell (RCE)
Exploitation of Web Application Frameworks
Exploitation of IoT Devices
Process Injection
Cron Job Manipulation
Attack Type Vulnerability
Targeted Applications React Server Components (RSC), Next.js, IoT Devices & Web Applications
Region Impacted United States, Germany, France, India
Industry Impacted Technology, Telecommunications, Healthcare, Finance, Retail, Manufacturing, Energy
IOC’s SHA-1 Hash
122334aefafbc5a82782ee1de1029b95b88ff278
be9473e2a27d1828441ef78356e75908cf27eb68
95592fc55945b243ae518fb3379440517654b351
b66e7b8f153779ae8521248b502fcf5e5116b3af
6bd5c6af884d46638ebc60434cfd35b37c1d3dd4
3c92104b70ed063dc34419612742e08fc67a225d
1539b2eb380fdf7c5ddc7c017118a81cf82bf774
e3dd33183ce13cbd184a7ebbe70edab97bb0f5cc
8907872767c587733bdaa7d91dab2f9cb75d21e1
5619b1c26a23919a2ea1e698ece953455da2fa95

SHA-256 Hash
95f8dff9cd26424b691a401c92fa7745e693275c38caf6a6aff277eadf2a70b
8e0bc23a87d349e5a5356252ce17576093b7858fdf6ea84919fbdcb2e117168e
50be5257678412f0810d46e0b0bc573eb65c6ce4617346c1527ff0dc9b7fc79e
858874057e3df990ccd7958a38936545938630410bde0c0c4b116f92733b1ddb

IP
5.231.70[.]66

URLs
45.134.174[.]235/2.sh
hxxp://46[.]36[.]37[.]85:12000/sex[.]sh
hxxp://115[.]42[.]60[.]223:61236/slt
hxxp://45[.]32[.]158[.]54/5e51aff54626ef7f/x86_64
hxxps://raw[.]githubusercontent[.]com/C3Pool/xmrig_setup/master/setup_c3pool_miner[.]sh
hxxp://78[.]153[.]140[.]16/kinsing
hxxp://38[.]165[.]44[.]205/api
api[.]hellknight[.]xyz
res[.]qiqigece[.]top
CVE CVE-2025-55182

Recommended Actions:

• Apply vendor-provided patches and updates to all vulnerable Next.js and React Server Components deployments to mitigate exploitation of React2Shell (CVE-2025-55182). Implement network segmentation controls to isolate IoT devices and exposed application servers, reducing the potential for lateral movement following compromise.


• Deploy Web Application Firewalls (WAFs) configured to detect and block exploitation attempts targeting known remote code execution vectors.


• Monitor systems for indicators of compromise, including unauthorized crontab modifications, abnormal process termination patterns, and unexpected resource utilization consistent with botnet or cryptocurrency mining activity.


• Block outbound communication with known RondoDox command-and-control (C2) infrastructure and proactively hunt for network traffic patterns indicative of botnet activity.


• Conduct regular vulnerability assessments and hardening of exposed web servers and IoT devices to reduce the likelihood of future exploitation.

References :

https://www.trendmicro.com/en/research/25/l/CVE-2025-55182-analysis-poc-itw.html