Mirai Botnet Exploits End-of-Life D-Link Routers via RCE
A new Mirai botnet campaign is actively exploiting a critical command injection vulnerability (CVE-2025-29635) in end-of-life D-Link DIR-823X routers. BleepingComputer reports that this flaw allows attackers to remotely execute code, enlisting these compromised devices into the Mirai botnet for launching distributed denial-of-service (DDoS) attacks.
This campaign highlights a persistent threat: the exploitation of unpatched, legacy devices. Organizations still running these vulnerable D-Link routers, especially those exposed to the internet, are prime targets. Defenders must prioritize identifying and decommissioning or isolating end-of-life hardware to prevent it from becoming a pivot point for botnets.
What This Means For You
- If your organization has deployed D-Link DIR-823X routers, immediately conduct an inventory of all network devices to identify any still in use. Isolate or decommission any identified units from the network and verify they are not publicly accessible. Prioritize upgrading to supported hardware to eliminate this known RCE vector.
Related ATT&CK Techniques
๐ก๏ธ Detection Rules
1 rule ยท 6 SIEM formats1 detection rule auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free โ export to any SIEM format via the Intel Bot.
Exploitation Attempt โ D-Link
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2025-29635 | RCE | D-Link DIR-823X routers |
| CVE-2025-29635 | Command Injection | D-Link DIR-823X routers |