Mirai Campaign Exploiting CVE-2025-29635 in D-Link Routers
A new Mirai-based malware campaign is exploiting CVE-2025-29635, a command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.
A new Mirai-based malware campaign has been observed exploiting CVE-2025-29635, a high-severity command injection vulnerability affecting D-Link DIR-823X routers. Discovered by Akamai’s SIRT in March 2026, the campaign involves attackers sending malicious POST requests to vulnerable D-Link routers to execute arbitrary commands. This vulnerability allows attackers to download and execute a shell script, ultimately leading to the deployment of Mirai-based malware. The affected D-Link routers reached end-of-life in November 2024, meaning a patch is unlikely. The same actor is also exploiting CVE-2023-1389 impacting TP-Link routers, and an RCE flaw in ZTE ZXV10 H108L routers, deploying the same Mirai payload.
Attack Chain
- The attacker sends a POST request to the
/goform/set_prohibitingendpoint on the D-Link DIR-823X router. - The POST request exploits CVE-2025-29635 to inject and execute arbitrary commands.
- The injected commands change directories across writable paths on the router.
- A shell script named
dlink.shis downloaded from an external IP address. - The
dlink.shscript is executed on the compromised router. - The script installs a Mirai-based malware variant named “tuxnokill”.
- “tuxnokill” establishes persistence and begins scanning for new targets.
- The compromised device is then used to launch DDoS attacks, leveraging Mirai’s standard capabilities, including TCP SYN/ACK/STOMP, UDP floods, and HTTP null attacks.
Impact
Successful exploitation of CVE-2025-29635 allows attackers to remotely execute arbitrary commands on vulnerable D-Link DIR-823X routers. The compromised routers are then incorporated into the Mirai botnet, increasing its size and DDoS capabilities. Given that these routers are end-of-life, many remain unpatched, potentially leading to a large number of compromised devices. This can result in network disruptions and service outages for targeted entities, as well as potential data exfiltration.
Recommendation
- Monitor network traffic for POST requests to the
/goform/set_prohibitingendpoint on D-Link routers, as described in the Attack Chain, to detect potential exploitation attempts. - Deploy the Sigma rule
Detect Mirai dlink.sh Downloadto identify attempts to download the malicious shell script. - If using affected D-Link DIR-823X routers, TP-Link, or ZTE ZXV10 H108L routers, upgrade to a supported device or implement network segmentation to limit potential damage.
- Block the external IP address hosting the
dlink.shscript if it can be reliably determined and is observed on your network.
Detection coverage 2
Detect Mirai dlink.sh Download
highDetects HTTP requests attempting to download the dlink.sh script associated with the Mirai campaign exploiting CVE-2025-29635.
Detect POST Request to D-Link Configuration Endpoint
mediumDetects POST requests to the /goform/set_prohibiting endpoint, which is targeted by CVE-2025-29635 exploits.
Detection queries are kept inside the platform. Get full rules →