HomeVulnerabilityUnpatched Edimax Digital camera Flaw Exploited for Mirai Botnet Attacks Since Final...

Unpatched Edimax Digital camera Flaw Exploited for Mirai Botnet Attacks Since Final Yr

An unpatched security flaw impacting the Edimax IC-7100 community digital camera is being exploited by risk actors to ship Mirat botnet malware variants since a minimum of Could 2024.

The vulnerability in query is CVE-2025-1316 (CVSS v4 rating: 9.3), a important working system command injection flaw that an attacker might exploit to realize distant code execution on inclined units by the use of a specifically crafted request.

Internet infrastructure and security firm Akamai mentioned the earliest exploit try concentrating on the flaw dates again to Could 2024, though a proof-of-concept (PoC) exploit has been publicly out there since June 2023.

Cybersecurity

“The exploit targets the /camera-cgi/admin/param.cgi endpoint in Edimax units, and injects instructions into the NTP_serverName choice as a part of the ipcamSource choice of param.cgi,” Akamai researchers Kyle Lefton and Larry Cashdollar mentioned.

Whereas weaponizing the endpoint requires authentication, it has been discovered that the exploitation makes an attempt are making use of default credentials (admin:1234) to acquire unauthorized entry.

See also  Simple Configuration Fixes Can Defend Your Server from Attack

Not less than two completely different Mirai botnet variants have been recognized as exploiting the vulnerability, with certainly one of them additionally incorporating anti-debugging performance previous to working a shell script that retrieves the malware for various architectures.

The top purpose of those campaigns is to corral the contaminated units right into a community able to orchestrating distributed denial-of-service (DDoS) assaults in opposition to targets of curiosity over TCP and UDP protocols.

Mirai Botnet Attacks

Moreover, the botnets have been noticed exploiting CVE-2024-7214, which impacts TOTOLINK IoT units, and CVE-2021-36220, and a Hadoop YARN vulnerability.

In an impartial advisory printed final week, Edimax mentioned the CVE-2025-1316 impacts legacy units which might be not actively supported and that it has no plans to offer a security patch for the reason that mannequin was discontinued over 10 years in the past.

Cybersecurity

Given the absence of an official patch, customers are suggested to both improve to a more recent mannequin, or keep away from exposing the system straight over the web, change the default admin password, and monitor entry logs for any indicators of surprising exercise.

See also  Use fee tech and nonetheless not prepared for PCI DSS 4.0? You can face stiff penalties

“One of the efficient methods for cybercriminals to begin assembling a botnet is to focus on poorly secured and outdated firmware on older units,” Akamai mentioned.

“The legacy of Mirai continues to plague organizations worldwide because the propagation of Mirai malware–primarily based botnets reveals no indicators of stopping. With all kinds of freely out there tutorials and supply code (and, now, with AI help) spinning up a botnet has turn into even simpler.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular