What's Happening?
The RondoDox botnet has been actively exploiting a vulnerability known as React2Shell, which affects Next.js servers using version 19 of the React JavaScript library. This security flaw, identified as CVE-2025-55182, allows attackers to execute remote
code by sending specially crafted HTTP requests to React Server Function endpoints. The vulnerability was publicly disclosed on December 3, 2025, and has since been targeted by various threat actors, including those linked to China. The RondoDox botnet operators began exploiting this flaw shortly after its disclosure, focusing on Next.js instances. They have been scanning for vulnerable servers and deploying malicious payloads, including a botnet support framework and cryptocurrency miners. The botnet's activities have involved a Linux-focused payload and have targeted internet-facing routers, IP cameras, and network appliances.
Why It's Important?
The exploitation of the React2Shell vulnerability by the RondoDox botnet poses significant risks to organizations using affected systems. The ability to execute remote code can lead to unauthorized access, data breaches, and the deployment of additional malware, such as cryptocurrency miners. This situation highlights the critical need for timely patching and updates to mitigate vulnerabilities in widely used software frameworks like React. The involvement of multiple threat actors, including those with potential state affiliations, underscores the broader cybersecurity challenges faced by businesses and governments. The ongoing attacks could lead to increased costs for affected organizations, including expenses related to incident response, system recovery, and potential regulatory fines.
What's Next?
Organizations using Next.js and other affected frameworks should prioritize applying security patches to mitigate the React2Shell vulnerability. Cybersecurity teams need to enhance monitoring and detection capabilities to identify and respond to exploitation attempts promptly. Collaboration between security researchers, software developers, and industry stakeholders is essential to address such vulnerabilities and improve the overall security posture of open-source projects. Additionally, there may be increased scrutiny and regulatory focus on software supply chain security, prompting organizations to adopt more robust security practices.













