HomeVulnerabilityMirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Menace actors are exploiting security flaws in TBK DVR and finish‑of‑life (EoL) TP-Hyperlink Wi-Fi routers to deploy Mirai-botnet variants on compromised gadgets, in response to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42.

The assault concentrating on TBK DVR gadgets has been discovered to use CVE-2024-3721 (CVSS rating: 6.3), a medium-severity command injection vulnerability affecting TBK DVR-4104 and DVR-4216 digital video recording gadgets, to ship a Mirai variant known as Nexcorium.

“IoT gadgets are more and more prime targets for large-scale assaults as a consequence of their widespread use, lack of patching, and infrequently weak security settings,” security researcher Vincent Li mentioned. “Menace actors proceed exploiting recognized vulnerabilities to achieve preliminary entry and deploy malware that may persist, unfold, and trigger distributed denial-of-service (DDoS) assaults.”

This isn’t the primary time the vulnerability has been exploited within the wild. Over the previous yr, the security difficulty has been leveraged to deploy a Mirai variant in addition to a definite, comparatively new botnet known as RondoDox. In September 2025, CloudSEK additionally disclosed particulars of a large-scale loader-as-a-service botnet that has been distributing RondoDox, Mirai, and Morte payloads via weak credentials and outdated flaws in routers, IoT gadgets, and enterprise apps.

See also  New Malware Targets Uncovered Docker APIs for Cryptocurrency Mining

The assault exercise outlined by Fortinet entails the exploitation of CVE-2024-3721 to acquire and drop a downloader script, which then launches the botnet payload based mostly on the Linux system’s structure. As soon as the malware is executed, it shows a message stating “nexuscorp has taken management.”

“Nexcorium has the same structure to the Mirai variant, together with XOR-encoded configuration desk initialization, watchdog module, and DDoS assault module,” the security vendor mentioned.

The malware additionally contains an exploit for CVE-2017-17215 to focus on Huawei HG532 gadgets within the community and incorporates an inventory of hard-coded usernames and passwords to be used in brute-force assaults concentrating on the sufferer’s hosts by opening a Telnet connection.

If the Telnet login is profitable, it makes an attempt to acquire a shell, arrange persistence utilizing crontab and systemd service, and hook up with an exterior server to await instructions for launching DDoS assaults over UDP, TCP, and SMTP. As soon as persistence is established on the machine, the malware deletes the unique downloaded binary to evade evaluation.

See also  CISA flags Home windows Process Host vulnerability as exploited in assaults

“The Nexcorium malware shows typical traits of contemporary IoT-focused botnets, combining vulnerability exploitation, assist for a number of architectures, and numerous persistence strategies to maintain long-term entry to contaminated techniques,” Fortinet mentioned. “Its use of recognized exploits, akin to CVE-2017-17215, together with intensive brute-force capabilities, underscores its adaptability and efficacy in growing its an infection attain.”

The event comes as Unit 42 mentioned it detected energetic, automated scans and probes trying to use CVE-2023-33538 (CVSS rating: 8.8), a command injection vulnerability impacting EoL TP-Hyperlink wi-fi routers, albeit utilizing a flawed method that does not lead to a profitable compromise.

It is price noting that the security flaw was added to the U.S. Cybersecurity and Infrastructure Safety Company’s (CISA) Identified Exploited Vulnerabilities (KEV) catalog in June 2025. The vulnerability impacts the next fashions –

  • TL-WR940N v2 and v4
  • TL-WR740N v1 and v2
  • TL-WR841N v8 and v10

“Though the in-the-wild assaults we noticed have been flawed and would fail, our evaluation confirms the underlying vulnerability is actual,” researchers Asher Davila, Malav Vyas, and Chris Navarrete mentioned. “Profitable exploitation requires authentication to the router’s internet interface.”

See also  THN Cybersecurity Recap: High Threats and Developments (Sep 30

The assaults, on this case, try to deploy a Mirai-like botnet malware, with the supply code that includes quite a few references to the string “Condi.” It additionally comes outfitted with the flexibility to replace itself with a more moderen model and act as an internet server to unfold the an infection to different gadgets that hook up with it.

Provided that the affected TP‑Hyperlink gadgets are not actively supported, customers are suggested to exchange them with a more moderen mannequin and be sure that default credentials are usually not used.

“For the foreseeable future, the security panorama will proceed to be formed by the persistent threat of default credentials in IoT gadgets,” Unit 42 mentioned. “These credentials can flip a restricted, authenticated vulnerability right into a vital entry level for decided attackers.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular