<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ZXV10 H108L — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/zxv10-h108l/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 23 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/zxv10-h108l/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mirai Campaign Exploiting CVE-2025-29635 in D-Link Routers</title><link>https://feed.craftedsignal.io/briefs/2026-04-mirai-dlink-rce/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mirai-dlink-rce/</guid><description>A new Mirai-based malware campaign is exploiting CVE-2025-29635, a command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.</description><content:encoded><![CDATA[<p>A new Mirai-based malware campaign has been observed exploiting CVE-2025-29635, a high-severity command injection vulnerability affecting D-Link DIR-823X routers. Discovered by Akamai&rsquo;s SIRT in March 2026, the campaign involves attackers sending malicious POST requests to vulnerable D-Link routers to execute arbitrary commands. This vulnerability allows attackers to download and execute a shell script, ultimately leading to the deployment of Mirai-based malware. The affected D-Link routers reached end-of-life in November 2024, meaning a patch is unlikely. The same actor is also exploiting CVE-2023-1389 impacting TP-Link routers, and an RCE flaw in ZTE ZXV10 H108L routers, deploying the same Mirai payload.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a POST request to the <code>/goform/set_prohibiting</code> endpoint on the D-Link DIR-823X router.</li>
<li>The POST request exploits CVE-2025-29635 to inject and execute arbitrary commands.</li>
<li>The injected commands change directories across writable paths on the router.</li>
<li>A shell script named <code>dlink.sh</code> is downloaded from an external IP address.</li>
<li>The <code>dlink.sh</code> script is executed on the compromised router.</li>
<li>The script installs a Mirai-based malware variant named &ldquo;tuxnokill&rdquo;.</li>
<li>&ldquo;tuxnokill&rdquo; establishes persistence and begins scanning for new targets.</li>
<li>The compromised device is then used to launch DDoS attacks, leveraging Mirai&rsquo;s standard capabilities, including TCP SYN/ACK/STOMP, UDP floods, and HTTP null attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-29635 allows attackers to remotely execute arbitrary commands on vulnerable D-Link DIR-823X routers. The compromised routers are then incorporated into the Mirai botnet, increasing its size and DDoS capabilities. Given that these routers are end-of-life, many remain unpatched, potentially leading to a large number of compromised devices. This can result in network disruptions and service outages for targeted entities, as well as potential data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for POST requests to the <code>/goform/set_prohibiting</code> endpoint on D-Link routers, as described in the Attack Chain, to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Mirai dlink.sh Download</code> to identify attempts to download the malicious shell script.</li>
<li>If using affected D-Link DIR-823X routers, TP-Link, or ZTE ZXV10 H108L routers, upgrade to a supported device or implement network segmentation to limit potential damage.</li>
<li>Block the external IP address hosting the <code>dlink.sh</code> script if it can be reliably determined and is observed on your network.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>mirai</category><category>ddos</category><category>rce</category><category>iot</category></item></channel></rss>