Mirai Botnet Targets End-of-Life D-Link Routers Through RCE Flaw


A new Mirai-based campaign is actively exploiting CVE-2025-29635, a command injection flaw in D-Link DIR-823X routers, to infect exposed devices and add them to a botnet. Akamai’s Security Intelligence and Response Team detected the activity in its honeypots in early March 2026, roughly a year after the vulnerability was first disclosed.

The flaw affects D-Link DIR-823X firmware versions 240126 and 240802. It allows an authorized attacker to execute arbitrary commands by sending a crafted POST request to the /goform/set_prohibiting endpoint.

The bigger issue is support status. D-Link lists the DIR-823X as an end-of-life and end-of-service product, with all hardware revisions no longer supported. D-Link says firmware development stops for EOL products and recommends retiring and replacing affected devices.

Akamai says the campaign sends POST requests that move through writable directories, download a shell script named dlink.sh, and execute it on the device. That script installs a Mirai-based malware variant called tuxnokill, which supports multiple device architectures.

Once installed, the malware gives attackers control over the router for botnet activity. Akamai says the variant includes typical Mirai distributed denial-of-service capabilities, including TCP SYN, TCP ACK, TCP STOMP, UDP floods, and HTTP null attacks.

The campaign also shows that older public vulnerabilities remain valuable to botnet operators. The researchers who originally reported CVE-2025-29635 briefly published proof-of-concept exploit code on GitHub before removing it, but the vulnerability details stayed public.

At a glance

ItemWhat current reporting shows
Malware familyMirai-based botnet
Variant nametuxnokill
Main vulnerabilityCVE-2025-29635
Affected deviceD-Link DIR-823X routers
Affected firmware240126 and 240802
Vulnerability typeCommand injection
Exploited endpoint/goform/set_prohibiting
First public disclosureMarch 2025
Active exploitation seenEarly March 2026
Support statusEnd-of-life and end-of-service
Main riskRouter takeover and DDoS activity

CISA adds CVE-2025-29635 to KEV

CISA added CVE-2025-29635 to its Known Exploited Vulnerabilities catalog on April 24, 2026, after evidence of active exploitation. The agency set a May 8, 2026 deadline for U.S. federal civilian agencies to apply mitigations or discontinue use if mitigations are unavailable.

The KEV entry describes the issue as a D-Link DIR-823X command injection vulnerability. CISA’s required action tells agencies to follow vendor guidance or stop using the product when no mitigation is available.

That guidance matters for home users and small businesses too. If a router has reached end of life and receives no firmware fixes, the safest long-term step is replacement, especially when attackers are already exploiting the flaw.

Akamai says the same activity did not stop with D-Link. The threat actor behind the campaign also exploited CVE-2023-1389 in TP-Link routers and a separate remote code execution flaw in ZTE ZXV10 H108L routers.

The same pattern appeared across these targets. Attackers used router flaws to run commands, download malware, and deploy a Mirai payload.

That pattern fits Mirai’s long-running strategy. Botnet operators look for internet-exposed routers, cameras, DVRs, and other embedded devices that users rarely patch or replace.

Why end-of-life routers are a major risk

End-of-life routers create a simple opening for attackers. The devices often remain online for years, but vendors no longer provide security updates or customer support.

D-Link’s advisory says EOL devices normally receive no further extended support or firmware development. It also warns that continued use of retired devices may create risk for other connected devices.

That risk becomes worse when a vulnerability enters active exploitation. A router sits at the edge of a home or office network, so compromise can affect internet access, traffic routing, and future attacks against other targets.

What users should do now

  • Replace D-Link DIR-823X routers with a supported model.
  • Disable remote administration if it is enabled.
  • Change the router admin password from the default.
  • Update to the latest available firmware if replacement cannot happen immediately.
  • Check for unknown DNS, port forwarding, or admin account changes.
  • Reboot the device after reviewing settings, but do not rely on rebooting as a fix.
  • Place management access behind a trusted local network only.
  • Monitor for unusual outbound traffic or bandwidth spikes.

What administrators should watch for

Network defenders should look for POST requests to /goform/set_prohibiting, downloads of dlink.sh, and outbound connections to suspicious infrastructure linked to Mirai payload delivery. Akamai published indicators of compromise with its analysis to help defenders identify related activity.

Administrators should also review exposed router management interfaces. Internet-facing admin panels create unnecessary risk, especially for retired devices with known command injection flaws.

For organizations, the policy should be direct. Routers, VPN appliances, firewalls, and edge devices need a lifecycle plan, not just passwords and occasional reboots.

FAQ

What is CVE-2025-29635?

CVE-2025-29635 is a command injection vulnerability in D-Link DIR-823X firmware versions 240126 and 240802. It allows an authorized attacker to execute commands by sending a crafted POST request to /goform/set_prohibiting.

Which devices are affected?

The issue affects D-Link DIR-823X routers running firmware versions 240126 and 240802. D-Link lists DIR-823X all hardware revisions as end-of-life and end-of-service.

Is there a patch?

D-Link’s advisory says DIR-823X has reached end-of-life, and firmware development has stopped for EOL products. The vendor recommends retiring and replacing the device.

What malware is being installed?

Akamai says attackers are installing a Mirai-based variant named tuxnokill, which supports multiple architectures and includes common DDoS capabilities.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages