CVE-2025-55182 Exploitation Hits the Smart Home
Shortly after details of CVE-2025-55182 became public, we began noticing large volumes of exploitation attempts across our endpoint and network sensors. The vulnerability, informally referred to as React2Shell, affects Node.js applications that allow user-supplied JSON data to influence internal JavaScript object structures. When improperly validated, attackers can escalate this into remote command execution through access to process.mainModule.require and, subsequently, child_process.execSync.
For HomeFor BusinessFor Partners
CVE-2025-55182 Exploitation Hits the Smart Home
Ioan Alexandru MELNICIUC
Paul SATMAREAN
December 09, 2025
[CVE-2025-55182 Exploitation Hits the Smart Home]
Shortly after details of CVE-2025-55182 became public, we began noticing large volumes of exploitation attempts across our endpoint and network sensors. The vulnerability, informally referred to as React2Shell, affects Node.js applications that allow user-supplied JSON data to influence internal JavaScript object structures. When improperly validated, attackers can escalate this into remote command execution through access to process.mainModule.require and, subsequently, child_process.execSync. For a complete overview of the vulnerability, we have the deep-dive blog post on Business Insights.
Because this vulnerability is simple to weaponize and widely applicable, it was rapidly adopted by botnet operators. Smart home insights for the past 30 days provide a clear picture of how the exploit is being used in active campaigns.
Scale of the attacks
We recorded more than 150,000 blocked exploit attempts matching the React2Shell pattern per day. The majority of detections involved direct command injection signatures linked to BusyBox execution, file download attempts via wget or curl, privilege modification through chmod, and various obfuscation patterns (including base64 decoding sequences designed to evade simple filtering).
While some requests were reconnaissance probes, most were structured payloads intended to download and run malware.
Attack origin
A significant portion of the traffic originates from a datacenter in Poland. One IP address in particular was responsible for more than 12,000 React2Shell-related events, along with port scanning and attempts to exploit known Hikvision vulnerabilities. This behavior aligns with patterns seen in Mirai-derived botnets, where compromised infrastructure is used both for scanning and for launching multi-vector attacks.
Additional probing comes from the United States, the Netherlands, Ireland, France, Hong Kong, Singapore, China, Panama, and other regions, indicating broad global participation in opportunistic exploitation.
Targeted devices
Attack attempts were directed at a wide variety of device types, showing the opportunistic nature of such attempts. The most frequently targeted models included smart plugs, smart phones, NAS devices, surveillance systems, routers, development boards, as well as various makes and models of smart TVs and consumer electronics.
The large number of unknown device fingerprints suggests many attacks targeted generic Linux-based web interfaces that do not expose clear identification data. This spread matches established botnet targeting behavior: attackers probe any device with an exposed HTTP endpoint, regardless of manufacturer or purpose.
Payload analysis
We identified two major payload families delivered through React2Shell in the last week:
- Mirai and Mirai-derived loaders.
These payloads often used BusyBox commands to download binaries from infrastructure hosted at 193.34.213[.]150, using filenames such as x86 and bolts. The infection chain included download, permission modification, execution, and a follow-up request to retrieve secondary components.
- Rondo miner deployments.
Another campaign used the vulnerability to download the script rondo.aqu.sh from 41.231.37[.]153. This installer fetched both a propagation module and a cryptocurrency mining component.
Both types of campaigns align with typical botnet monetization strategies: distributed denial-of-service capability, further worming, and illicit mining.
Why React2Shell is being widely used
CVE-2025-55182 offers attackers a straightforward path from web request to system-level command execution. The exploit payload is compact, requires no advanced techniques, and works against a large class of Node.js applications. Botnet operators historically adopt vulnerabilities like this within days, and our monitoring shows that React2Shell is no exception.
What this means for users
The exploitation attempts we observed are automated and indiscriminate. Any publicly exposed service running a vulnerable implementation is a potential target. Organizations that develop or deploy Node.js applications should apply available patches immediately and verify that JSON parsing logic does not allow prototype pollution or object structure manipulation.
For IoT and consumer devices, reducing exposure through proper network segmentation and disabling unnecessary remote access remains essential. Once a device is compromised, it is commonly repurposed as an attack platform, perpetuating the cycle of scanning and exploitation.
We will continue monitoring activity related to CVE-2025-55182 and provide updates as new payloads or threat actors emerge.
Appendix: Indicators of Compromise (IoCs)
Malicious infrastructure
Primary exploit and malware delivery hosts observed in React2Shell campaigns:
193.34.213.150- Used to deliver Mirai-style binaries under paths including/nuts/x86and/nuts/bolts. Payloads retrieved through wget, curl, orBusyBox. Frequently paired withchmod 777and direct execution.41.231.37.153- Host serving the scriptrondo.aqu.sh, which deploys both a botnet loader and a cryptocurrency miner. Accessed throughwgetorcurlwith a fallbackBusyBoxretrieval chain.
Still active Mirai delivery endpoints:
http://193.34.213.150/nuts/x86http://193.34.213.150/nuts/bolts
http://89.144.31.18/nuts/x86http://89.144.31.18/nuts/bolts
http://31.56.27.76/n2/x86
http://172.237.55.180/c
Other domains
http://gfxnick.emerald.usbx.me/bot
Rondo delivery infrastructure
http://41.231.37.153/rondo.aqu.sh
http://23.228.188.126/rondo.aqu.sh
Mirai miner delivery infrastructure
http://176.117.107.154/bot
http://23.132.164.54/bothttps://f003.backblazeb2.com/file/mova12/98201-1-8/bot
Malicious file hashes
- 622f904bb82c8118da2966a957526a2b
- a51a5c1e7d2bc3f7b2e3489f92a55d46
- aaca45131c5a5a95d384431e415474f7
- ca7f4b8e296fc4ef46ecb07218434e1b
- c50db4734195579e83834b2a84758cea
- e13a61420568eb596224ff8e48ea415a
- 025f5e04e54497242749ec480310fd7e
- 3ba4d5e0cf0557f03ee5a97a2de56511
- bf9d7224e709b4ac90a498418af20d3a
- a51a5c1e7d2bc3f7b2e3489f92a55d46
- aaca45131c5a5a95d384431e415474f7
- ca7f4b8e296fc4ef46ecb07218434e1b
- c50db4734195579e83834b2a84758cea
- e13a61420568eb596224ff8e48ea415a
- 025f5e04e54497242749ec480310fd7e
- 3ba4d5e0cf0557f03ee5a97a2de56511
tags
IoT Research
Author
Ioan Alexandru MELNICIUC
When not diving deep into vulnerability assessments, I enjoy immersing myself in nature. I analyze binaries to the rhythms I love dancing to, letting the bits guide me both on and off the dance floor.
View all posts
Paul SATMAREAN
Paul Satmarean is a team leader with a strong focus in network security, botnets and technology. In his free time, he loves photography and gaming.
View all posts
You might also like
Bookmarks