You are currently viewing Mirai Turns Unsupported D-Link Routers into DDoS Weapons Using CVE-2025-29635

Mirai Turns Unsupported D-Link Routers into DDoS Weapons Using CVE-2025-29635

  • Post author:
  • Reading time:4 mins read

Researchers have uncovered an active Mirai botnet campaign exploiting CVE-2025-29635, a command-injection vulnerability in legacy D-Link DIR-823X routers, to recruit internet-exposed devices into a distributed denial-of-service (DDoS) botnet. Attackers deploy a Mirai malware variant known as “tuxnokill,” which establishes command-and-control (C2) communication, spreads to additional vulnerable IoT devices, and prepares infected systems for large-scale DDoS operations.

The objective of this campaign is simple but highly damaging: compromise unsupported D-Link routers at scale, weaponize them as Mirai botnet nodes, and leverage that infrastructure for DDoS attacks and further botnet propagation across connected networks.

Vulnerability & Affected Products

The campaign centers specifically around CVE-2025-29635:

CVE IDCVE-2025-29635
Vulnerability TypeOS Command Injection (CWE-77)
CVSS Score7.2 (High)
EPSS Score58.94%
Affected ProductsD-Link DIR-823X routers
Affected FirmwareVersions 240126 and 240802
Vulnerable EndpointPOST /goform/set_prohibiting
Root CauseUnsanitized user input passed into system() via snprintf()
Fixed VersionNo official patch available
Role in CampaignPrimary initial access vector

Attack Methodology: CVE-2025-29635 Exploitation Chain

Exploitation of CVE-2025-29635 is fully automated and requires no user interaction. Any internet-exposed vulnerable D-Link DIR-823X router can be remotely compromised.

Initial Exploitation: Attackers send a specially crafted POST request to the /goform/set_prohibiting endpoint of the router. The vulnerability exists because attacker-controlled input is copied into a command string using snprintf() and later executed using the system() function without proper sanitization or validation. This allows attackers to inject shell metacharacters and execute arbitrary operating system commands directly on the device.

Downloader Delivery: After successful command injection, the attacker downloads a shell script named dlink.sh. The downloader infrastructure was observed hosted at 88.214.20[.]14. Multiple fallback methods such as busybox wget, curl, wget, tftp, and ftpget are used to ensure payload delivery even if some utilities are unavailable on the target device.

Payload Deployment: The dlink.sh script downloads and executes the Mirai malware payload named tuxnokill. The malware is compiled for multiple CPU architectures including ARM, MIPS, x86, and x86_64, enabling infection across diverse embedded Linux environments. This allows broad-scale compromise of heterogeneous IoT and networking devices.

Configuration Unpacking: Once executed, the malware decodes its embedded configuration using XOR Key: 0x30.


MITRE ATT&CK: Tactics and Techniques

IDTacticTechniqueDescription
TA0001Initial AccessT1190 – Exploit Public-Facing ApplicationExploiting CVE-2025-29635 via crafted POST requests
TA0002ExecutionT1059.004 – Unix ShellInjected shell commands execute directly through system()
TA0003PersistenceT1105 – Ingress Tool TransferDelivery of downloader and Mirai payload
TA0005Defense EvasionT1027 – Obfuscated Files or InformationXOR encoding hides malware configuration
TA0011Command and ControlT1071 – Application Layer ProtocolCommunication with external C2 server
TA0040ImpactT1498 – Network Denial of ServiceMirai DDoS flooding operations

Indicators of Compromise (IOCs)

The following artifacts were identified during analysis of the CVE-2025-29635 campaign:

TypeIndicator
Downloader IP88.214.20[.]14
C2 Server64.89.161[.]130:44300
Malware Nametuxnokill
Download Scriptdlink.sh
Vulnerable EndpointPOST /goform/set_prohibiting
Common Execution Paths/tmp, /var/run, /mnt, /root, /
XOR Encoding Key0x30
Hardcoded StringAI.NEEDS.TO.DIE

SHA256 Hashes

  • 72eff03b8573329818b38185074aa763e99d15f5709fecc44f9afece21dc06d8
  • 32ca4b70e84787144574bfdb85a0092f3ebf524bb78febdd28d4c832b53fe100
  • be902e86ec68515e23a3387a21e80d098d258223ce562598c27ee6d89b83ff2b
  • d232c0960f24ba4bb369821b1bf2836d9e576a34fa3ddca2618c80b2f54277f7
  • 7792f5c1d5c6c6415732ba0f63328549e19cc9c182c258c17b97b77fdb5541b8

Visual Attack Flow

[Attacker Sends Crafted POST to /goform/set_prohibiting]
-> [CVE-2025-29635 Command Injection Executes via system()]
-> [Shell Script dlink.sh Downloaded from 88.214.20[.]14]
-> [Mirai Payload “tuxnokill” Downloaded and Executed]
-> [XOR-Decoded Configuration Loaded: C2 + Attack Modules]
-> [Router Connects to C2 at 64.89.161[.]130:44300]
-> [Mirai Botnet Receives DDoS Commands]
-> [Compromised Router Participates in Large-Scale DDoS Attacks]


Key Takeaways & Mitigation

  • Replace End-of-Life Devices Immediately: Since D-Link DIR-823X routers reached end-of-life in September 2025, no vendor patch is expected. Full device replacement is the safest and strongest mitigation.
  • Remove Direct Internet Exposure: If replacement cannot happen immediately, remove the router from direct internet exposure using firewalls, VPN-only access, NAT restrictions, and internal network segmentation.
  • Monitor for Outbound Connections: Alert on outbound traffic to 88.214.20[.]14 and 64.89.161[.]130, especially from devices that should not normally initiate external communications.
  • Inspect for Unexpected Shell Activity: Watch for shell script downloads such as dlink.sh, repeated wget, curl, tftp, or ftpget attempts, and binaries executed from directories like /tmp or /var/run, as these are strong indicators of compromise.
  • Segment IoT and Networking Devices: Place routers, cameras, DVRs, and embedded devices on isolated VLANs to prevent lateral movement into critical internal assets.
  • Block Mirai-Like Traffic Patterns: Monitor for unusual outbound network flood behavior that may indicate the device is participating in Mirai-driven DDoS attacks.

Instantly Fix Risks with Saner Patch Management

Saner patch management is a continuous, automated, and integrated software that instantly fixes risks exploited in the wild. The software supports major operating systems like Windows, Linux, and macOS, as well as 550+ third-party applications.

It also allows you to set up a safe testing area to test patches before deploying them in a primary production environment. Saner patch management additionally supports a patch rollback feature in case of patch failure or a system malfunction.

Experience the fastest and most accurate patching software here.