An unpatched safety flaw impacting the Edimax IC-7100 community digital camera is being exploited by risk actors to ship Mirat botnet malware variants since at the least Could 2024.
The vulnerability in query is CVE-2025-1316 (CVSS v4 rating: 9.3), a essential working system command injection flaw that an attacker might exploit to realize distant code execution on inclined units by way of a specifically crafted request.
Internet infrastructure and safety firm Akamai mentioned the earliest exploit try focusing on the flaw dates again to Could 2024, though a proof-of-concept (PoC) exploit has been publicly available since June 2023.
“The exploit targets the /camera-cgi/admin/param.cgi endpoint in Edimax units, and injects instructions into the NTP_serverName possibility as a part of the ipcamSource possibility of param.cgi,” Akamai researchers Kyle Lefton and Larry Cashdollar said.
Whereas weaponizing the endpoint requires authentication, it has been discovered that the exploitation makes an attempt are making use of default credentials (admin:1234) to acquire unauthorized entry.
No less than two completely different Mirai botnet variants have been recognized as exploiting the vulnerability, with considered one of them additionally incorporating anti-debugging performance previous to operating a shell script that retrieves the malware for various architectures.
The tip aim of those campaigns is to corral the contaminated units right into a community able to orchestrating distributed denial-of-service (DDoS) assaults towards targets of curiosity over TCP and UDP protocols.
Moreover, the botnets have been noticed exploiting CVE-2024-7214, which impacts TOTOLINK IoT units, and CVE-2021-36220, and a Hadoop YARN vulnerability.
In an impartial advisory printed final week, Edimax said the CVE-2025-1316 impacts legacy units which are now not actively supported and that it has no plans to supply a safety patch because the mannequin was discontinued over 10 years in the past.
Given the absence of an official patch, customers are suggested to both improve to a more moderen mannequin, or keep away from exposing the gadget straight over the web, change the default admin password, and monitor entry logs for any indicators of bizarre exercise.
“One of the vital efficient methods for cybercriminals to start out assembling a botnet is to focus on poorly secured and outdated firmware on older units,” Akamai mentioned.
“The legacy of Mirai continues to plague organizations worldwide because the propagation of Mirai malware–primarily based botnets exhibits no indicators of stopping. With all kinds of freely obtainable tutorials and supply code (and, now, with AI help) spinning up a botnet has turn into even simpler.”
Source link