Mirai Botnet Exploits Critical Flaw in Discontinued D-Link Routers for DDoS Attacks

New Mirai Botnet Campaign Actively Exploiting High-Severity RCE Flaw (CVE-2025-29635) in End-of-Life D-Link Routers

HIGH
April 24, 2026
5m read
MalwareVulnerabilityIoT Security

Related Entities

Organizations

D-Link Akamai TP-LinkZTE

Products & Tech

D-Link DIR-823X

Other

Mirai tuxnokill

CVE Identifiers

Full Report

Executive Summary

A new Mirai botnet campaign is actively exploiting a high-severity remote command execution (RCE) vulnerability, CVE-2025-29635, in discontinued D-Link DIR-823X routers. Security researchers at Akamai detected the in-the-wild exploitation beginning in March 2026, over a year after the flaw was disclosed. Attackers are leveraging the vulnerability to download and execute a shell script (dlink.sh) from a malicious server (88.214.20.14), which then installs a Mirai variant called tuxnokill. The compromised routers are then added to a botnet controlled by a C2 server at 64.89.161.130:44300, ready to participate in distributed denial-of-service (DDoS) attacks. The affected routers reached their end-of-life (EoL) in November 2024, and D-Link has stated they will not be patched, underscoring the persistent threat of legacy IoT devices.

Vulnerability Details

  • CVE ID: CVE-2025-29635
  • CVSS Score: 8.8 (High)
  • Vulnerability Type: Command Injection
  • Attack Vector: A remote, unauthenticated attacker can execute arbitrary commands by sending a specially crafted POST request to the /goform/set_prohibiting endpoint on a vulnerable router.

This type of vulnerability is common in embedded devices and is trivial to exploit once discovered. It allows the attacker to gain full control over the device's operating system.

Affected Systems

  • Product: D-Link DIR-823X series routers
  • Firmware Versions: 240126 and 24082
  • Status: End-of-Life (EoL) as of November 2024. No patches are available.

The same threat actor was also observed exploiting other known vulnerabilities, including CVE-2023-1389 in TP-Link routers and an RCE in ZTE ZXV10 H108L routers, as part of a broader campaign to build their botnet.

Exploitation Status

Akamai's honeypot network confirmed active, in-the-wild exploitation of CVE-2025-29635 starting in early March 2026. This is the first observed mass exploitation of this specific flaw. The attack chain is simple and automated:

  1. Scanning: The botnet scans the internet for vulnerable D-Link routers.
  2. Exploitation: (T1190 - Exploit Public-Facing Application) Upon finding a target, the attacker sends a malicious POST request to /goform/set_prohibiting to execute a command.
  3. Payload Download: (T1105 - Ingress Tool Transfer) The injected command downloads the dlink.sh script from 88.214.20.14.
  4. Installation: The script installs the tuxnokill Mirai variant.
  5. C2 Connection: The malware connects to the C2 server at 64.89.161.130:44300 to receive commands.

Impact Assessment

The immediate impact is the compromise of the affected D-Link routers, adding them to a growing DDoS botnet. For the owners of these routers, this can result in poor network performance and their IP address being implicated in malicious activity. The broader impact is the increased availability of DDoS-for-hire services powered by this botnet. These attacks can be used to disrupt websites, online services, and corporate networks, leading to financial and reputational damage for the victims. This campaign is a classic example of how threat actors leverage a 'long tail' of unpatched, end-of-life IoT devices to build powerful and resilient botnets at a massive scale.

IOCs — Directly from Articles

Type
ip_address_v4
Value
88.214.20.14
Description
Payload hosting server for dlink.sh script.
Type
ip_address_v4
Value
64.89.161.130
Description
Mirai C2 server.
Type
destination_port
Value
44300
Description
Port used for C2 communication with 64.89.161.130.
Type
file_name
Value
dlink.sh
Description
Malicious shell script downloader.
Type
malware
Value
tuxnokill
Description
Name of the Mirai botnet variant.

Cyber Observables — Hunting Hints

The following patterns may help identify vulnerable or compromised systems:

Type
url_pattern
Value
/goform/set_prohibiting
Description
HTTP POST requests to this endpoint are a direct indicator of an exploitation attempt against CVE-2025-29635.
Type
network_traffic_pattern
Value
Outbound connections to 88.214.20.14 or 64.89.161.130
Description
Any traffic from a D-Link router to these IPs is a strong indicator of compromise.
Type
network_traffic_pattern
Value
Telnet/SSH scans originating from IoT devices
Description
Compromised Mirai bots often scan the internet for other vulnerable devices. Monitor for this behavior from your network.

Detection Methods

  • Network Intrusion Detection Systems (NIDS/NIPS): Use signatures to detect and block exploit attempts against CVE-2025-29635. Signatures should look for POST requests to the /goform/set_prohibiting URI path.
  • Threat Intelligence: Ingest the provided IP IOCs into your firewall or SIEM to block and alert on any communication with the payload server or C2 server. This is a form of Network Traffic Analysis.
  • Asset Inventory: Identify all D-Link DIR-823X routers on your network, including those used by remote workers. These devices should be considered inherently insecure.

Remediation Steps

Since the affected devices are end-of-life, no patch is available. The only effective remediation is removal and replacement.

  1. Decommission and Replace: Immediately disconnect any D-Link DIR-823X routers from the internet. Replace them with a modern, supported device from a reputable manufacturer.
  2. Network Isolation: If immediate replacement is not possible, isolate the device on a separate network segment with strict firewall rules, blocking all inbound traffic from the internet and all unnecessary outbound traffic. This is a temporary, high-risk workaround.
  3. Password Management: For the replacement device, ensure the default administrator password is changed to a strong, unique password.
  4. Consumer Education: This incident serves as a critical reminder for consumers and small businesses to avoid using old, unsupported networking equipment. Regularly check for end-of-life notices from vendors. This relates to D3FEND's Platform Hardening principles.

Timeline of Events

1
November 1, 2024
D-Link DIR-823X routers officially reach their end-of-life (EoL).
2
March 1, 2026
Akamai's honeypot network begins detecting active exploitation of CVE-2025-29635 in the wild.
3
April 24, 2026
This article was published

MITRE ATT&CK Mitigations

The most effective mitigation is to physically remove and replace the end-of-life, vulnerable hardware.

Block inbound connections to the router's management interface from the internet. Also, block outbound connections to known malicious IPs.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The core issue with the D-Link DIR-823X routers is that they are end-of-life and cannot be patched. Therefore, the only definitive platform hardening action is to decommission and replace them. Organizations and individuals must adopt a lifecycle management approach for IoT and networking hardware. Any device that is no longer supported by the manufacturer must be considered insecure and removed from the network. For any new router being deployed, the first step should be to change the default admin password and disable remote administration from the WAN interface. This simple step of hardening prevents a huge number of automated attacks that scan for default credentials and exposed management ports. In this specific case, since a patch for CVE-2025-29635 will never be released, replacement is the only viable long-term solution.

To prevent the exploitation of CVE-2025-29635 and similar vulnerabilities, organizations must implement strict inbound traffic filtering at the network edge. The web administration interface of a SOHO router should never be exposed to the public internet. Configure your perimeter firewall to block all inbound connections to the router's management port (typically 80/443) from any external IP address. If remote management is absolutely necessary, it should be restricted to a small set of trusted IP addresses (e.g., a corporate static IP) and ideally done over a VPN. For home users, this setting is often labeled 'Disable Remote Management' in the router's admin panel and should always be enabled. This single control would have prevented this Mirai campaign from successfully compromising these D-Link routers.

Timeline of Events

1
November 1, 2024

D-Link DIR-823X routers officially reach their end-of-life (EoL).

2
March 1, 2026

Akamai's honeypot network begins detecting active exploitation of CVE-2025-29635 in the wild.

Sources & References

New Mirai campaign exploits RCE flaw in EoL D-Link routers
BleepingComputer (bleepingcomputer.com) April 22, 2026
Mirai Botnet Targets Flaw in Discontinued D-Link Routers
SecurityWeek (securityweek.com) April 22, 2026
Mirai botnet exploits CVE-2025-29635 to target legacy D-Link routers
Security Affairs (securityaffairs.co) April 22, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

MiraiBotnetDDoSIoTD-LinkVulnerabilityCVE-2025-29635End-of-Life

📢 Share This Article

Help others stay informed about cybersecurity threats