2026 Futuriom 50: Highlights →Explore

Executive Summary

In March 2026, Akamai's Security Intelligence and Response Team (SIRT) identified active exploitation of CVE-2025-29635, a command injection vulnerability in D-Link DIR-823X routers, by a new Mirai-based malware campaign. Attackers are sending POST requests to the vulnerable endpoint, executing remote commands to download and install a Mirai variant named "tuxnokill," which enables the compromised devices to perform distributed denial-of-service (DDoS) attacks. This marks the first observed in-the-wild exploitation of this vulnerability since its disclosure in March 2025. (akamai.com)

The exploitation of end-of-life (EoL) devices underscores the critical need for organizations to replace outdated hardware and apply security patches promptly. The resurgence of Mirai variants targeting unpatched IoT devices highlights the ongoing threat posed by botnets leveraging known vulnerabilities. (bleepingcomputer.com)

Why This Matters Now

The active exploitation of CVE-2025-29635 in D-Link DIR-823X routers by Mirai-based malware emphasizes the urgency for organizations to decommission EoL devices and ensure all network equipment is up-to-date. Failure to do so increases the risk of devices being co-opted into botnets, leading to potential DDoS attacks and network compromises.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

CVE-2025-29635 is a command injection vulnerability in D-Link DIR-823X routers that allows attackers to execute arbitrary commands remotely. ([nvd.nist.gov](https://nvd.nist.gov/vuln/detail/CVE-2025-29635?utm_source=openai))

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to exploit vulnerabilities and control compromised devices, thereby reducing the overall impact of the attack.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: The attacker's ability to exploit the command injection vulnerability may have been constrained, reducing the likelihood of successful remote code execution.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: The attacker's ability to escalate privileges and install malware could have been limited, reducing the scope of the compromise.

Lateral Movement

Control: East-West Traffic Security

Mitigation: If lateral movement had been attempted, it would likely have been constrained, reducing the potential for further compromise.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: The attacker's ability to establish and maintain command and control channels may have been limited, reducing their control over compromised devices.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: If data exfiltration had been attempted, it would likely have been constrained, reducing the risk of data loss.

Impact (Mitigations)

The overall impact of the attack could have been reduced, limiting the number of devices available for the botnet and the scale of the DDoS attacks.

Impact at a Glance

Affected Business Functions

  • Network Security
  • Internet Connectivity
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $50,000

Data Exposure

Potential exposure of network configurations and connected device information.

Recommended Actions

  • Implement inline intrusion prevention systems (IPS) to detect and block exploitation attempts targeting known vulnerabilities.
  • Enforce egress security and policy enforcement to control outbound traffic and prevent unauthorized communications with external command and control servers.
  • Enhance threat detection and anomaly response capabilities to identify and respond to unusual network activities indicative of malware infections.
  • Apply zero trust segmentation to limit the potential impact of compromised devices by restricting their access to critical network resources.
  • Regularly update and patch network devices to address known vulnerabilities and reduce the attack surface.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image