Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Act 2 of Drive Capital – How Columbus Ventures Success After Split

Don’t ask the blue ski toll ruble, it’s a toll for you

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Lack of edimax cameras that have been exploited in Mirai Botnet attacks since last year
Identity

Lack of edimax cameras that have been exploited in Mirai Botnet attacks since last year

userBy userMarch 17, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 17, 2025Ravi LakshmananBotnet/Vulnerability

Mirai Botnet Attack

The unearned security flaws affecting the edimax IC-7100 network cameras have been leveraged by threat actors to provide the Mirat Botnet malware variant since at least May 2024.

The vulnerability in question is CVE-2025-1316 (CVSS V4 score: 9.3). This is a critical operating system command injection flaw that attackers can utilize to achieve remote code execution on sensitive devices through specially written requests.

Web infrastructure and security company Akamai has been making the earliest exploit attempt to target defect dates through May 2024, but has been published since June 2023.

Cybersecurity

“The exploit targets the /camera-cgi/admin/admin/param.cgi endpoint on the edimax device and injects the command into the ntp_servername option as part of the IPCamsource option in param.cgi.

Although authentication is required to weaponize an endpoint, it is known that attempts to exploit are using default credentials (admin:1234) to obtain unauthorized access.

At least two different Mirai Botnet variants have been identified as exploiting the vulnerability, one of which also incorporates real estate prevention features before running a shell script to retrieve malware from different architectures.

The ultimate goal of these campaigns is to surround infected devices with a network that can coordinate distributed denial of distribution (DDOS) attacks against targets of interest through the TCP and UDP protocols.

Mirai Botnet Attack

Additionally, botnets have been observed using CVE-2024-7214, which affects vulnerabilities in Totolink IoT devices, CVE-2021-36220, and Hadoop Yarn.

In an independent recommendation released last week, Edimax said that CVE-2025-1316 has affected legacy devices that are no longer actively supported, and that there is no plan to provide security patches since the model was discontinued more than a decade ago.

Cybersecurity

Given the lack of official patches, it is recommended that users upgrade to a new model or not publish their devices directly on the Internet, change their default admin password, and monitor their access logs for indications of unusual activity.

“One of the most effective ways for cybercriminals to start assembling a botnet is to target poorly secure and outdated firmware on older devices,” Akamai said.

“Mirai’s legacy continues to plague organizations around the world as Mirai malware-based botnet propagation shows no indication of a halt,” he said. “All kinds of freely available tutorials and source code (and now with AI support) have made it even easier to spin the botnet.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDiscord launches an SDK to help developers improve social experiences in their games
Next Article Dr. Congo and M23 Rebels confirm participation in Angola Peace Meeting | Conflict News
user
  • Website

Related Posts

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

July 5, 2025

The exposed JDWP interface leads to crypto mining, and Hpingbot targets DDO’s SSH

July 5, 2025

TwinH: A New Frontier in the Pursuit of Immortality?

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Act 2 of Drive Capital – How Columbus Ventures Success After Split

Don’t ask the blue ski toll ruble, it’s a toll for you

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

The exposed JDWP interface leads to crypto mining, and Hpingbot targets DDO’s SSH

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.