Back to Feed
MalwareApr 22, 2026

New Mirai campaign exploits RCE flaw in EoL D-Link routers

New Mirai campaign actively exploits CVE-2025-29635 RCE flaw in end-of-life D-Link routers.

Summary

A Mirai-based malware campaign discovered by Akamai in March 2026 is actively exploiting CVE-2025-29635, a command-injection vulnerability in D-Link DIR-823X routers, to recruit devices into the botnet. The vulnerability was first disclosed 13 months prior but this represents the first observed in-the-wild exploitation. The threat actor deploys a Mirai variant called "tuxnokill" supporting multiple architectures and standard DDoS capabilities, and has also been observed exploiting similar flaws in TP-Link and ZTE routers.

Full text

New Mirai campaign exploits RCE flaw in EoL D-Link routers By Bill Toulas April 22, 2026 04:04 PM 0 A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet. CVE-2025-29635 allows an attacker to execute arbitrary commands on remote devices by sending a POST request to a vulnerable endpoint, triggering remote command execution (RCE). Akamai's SIRT, which detected the Mirai campaign in March 2026, reports that, although the flaw was first disclosed 13 months ago by security researchers Wang Jinshuai and Zhao Jiangting, this is the first time in-the-wild active exploitation has been observed. "The Akamai SIRT discovered active exploitation attempts of the D-Link command injection vulnerability CVE-2025-29635 in our global network of honeypots in early March 2026," reads Akamai's report. "This vulnerability exists in D-Link DIR-823X series routers in firmware versions 240126 and 24082, and allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to the /goform/set_prohibiting endpoint via the corresponding function, which can trigger remote command execution." The researchers who discovered the flaw briefly published a proof-of-concept (PoC) exploit on GitHub, but later retracted it. Akamai's observations show attackers are sending POST requests that change directories across writable paths, download a shell script (dlink.sh) from an external IP, and execute it. The observed POST requestsSource: Akamai The script installs a Mirai-based malware named "tuxnokill," which supports multiple architectures. In terms of capabilities, it features Mirai's standard distributed denial-of-service (DDoS) attack repertoire, including TCP SYN/ACK/STOMP, UDP floods, and HTTP null. Akamai has also found that the threat actor behind this campaign also exploits CVE-2023-1389, impacting TP-Link routers, and a separate RCE flaw in ZTE ZXV10 H108L routers. The same attack pattern was observed across all of them, leading to the deployment of a Mirai payload. The impacted devices reached end of life (EoL) in November 2024, so it's likely the latest firmware available for the model does not address CVE-2025-29635. D-Link does not make exceptions when active exploitation is detected, so it's unlikely the vendor will provide a fixing patch now. BleepingComputer has contacted D-Link with questions about the reported activity and the status of the fix, and we will update this post as soon as we hear back. Meanwhile, users of routers that have reached EoL are recommended to upgrade to a newer model that enjoys active support with frequent security fixes, disable remote administration portals if not needed, change default admin passwords, and monitor for unexpected configuration changes. 99% of What Mythos Found Is Still Unpatched. AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop. Claim Your Spot Related Articles: FCC bans new routers made outside the USA over security risksUS disrupts SocksEscort proxy network powered by Linux malwareNew GoGra malware for Linux uses Microsoft Graph API for commsNGate Android malware uses HandyPay NFC app to steal card dataThe Gentlemen ransomware now uses SystemBC for bot-powered attacks

Indicators of Compromise

  • malware — tuxnokill
  • malware — Mirai
  • cve — CVE-2025-29635
  • cve — CVE-2023-1389

Entities

D-Link (vendor)D-Link DIR-823X (product)TP-Link (vendor)ZTE (vendor)ZTE ZXV10 H108L (product)Akamai (vendor)