31 C
Washington
Wednesday, July 23, 2025

Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year

Must read

An unpatched safety flaw impacting the Edimax IC-7100 community digital camera is being exploited by menace actors to ship Mirat botnet malware variants since a minimum of Could 2024.

The vulnerability in query is CVE-2025-1316 (CVSS v4 rating: 9.3), a essential working system command injection flaw that an attacker might exploit to realize distant code execution on prone units via a specifically crafted request.

Net infrastructure and safety firm Akamai mentioned the earliest exploit try focusing on the flaw dates again to Could 2024, though a proof-of-concept (PoC) exploit has been publicly obtainable since June 2023.

“The exploit targets the /camera-cgi/admin/param.cgi endpoint in Edimax units, and injects instructions into the NTP_serverName choice as a part of the ipcamSource choice of param.cgi,” Akamai researchers Kyle Lefton and Larry Cashdollar mentioned.

Whereas weaponizing the endpoint requires authentication, it has been discovered that the exploitation makes an attempt are making use of default credentials (admin:1234) to acquire unauthorized entry.

No less than two completely different Mirai botnet variants have been recognized as exploiting the vulnerability, with considered one of them additionally incorporating anti-debugging performance previous to working a shell script that retrieves the malware for various architectures.

The top purpose of those campaigns is to corral the contaminated units right into a community able to orchestrating distributed denial-of-service (DDoS) assaults towards targets of curiosity over TCP and UDP protocols.

Mirai Botnet Attacks

Moreover, the botnets have been noticed exploiting CVE-2024-7214, which impacts TOTOLINK IoT units, CVE-2021-36220, and a Hadoop YARN vulnerability.

In an unbiased advisory revealed final week, Edimax mentioned the CVE-2025-1316 impacts legacy units which might be not actively supported and that it has no plans to supply a safety patch because the mannequin was discontinued over 10 years in the past.

See also  Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering

Given the absence of an official patch, customers are suggested to both improve to a more recent mannequin, or keep away from exposing the gadget immediately over the web, change the default admin password, and monitor entry logs for any indicators of surprising exercise.

“One of the vital efficient methods for cybercriminals to start out assembling a botnet is to focus on poorly secured and outdated firmware on older units,” Akamai mentioned.

“The legacy of Mirai continues to plague organizations worldwide because the propagation of Mirai malware–based mostly botnets reveals no indicators of stopping. With all types of freely obtainable tutorials and supply code (and, now, with AI help) spinning up a botnet has turn into even simpler.”

Related News

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News