Executive Summary
In December 2025, the RondoDox botnet exploited the critical React2Shell vulnerability (CVE-2025-55182) to breach hundreds of Next.js servers worldwide. Researchers observed the botnet initiating mass scans and automated remote code execution attacks against exposed servers, deploying malware, persistent botnet loaders, and cryptominers. RondoDox leveraged the unpatched flaw in the widely used React Server Components protocol, enrolling compromised systems and IoT devices into its botnet and wiping out competing malware. The attack impacted both consumer and enterprise networks, risking data exfiltration, service outages, and broader supply chain compromise.
This campaign underscores the increased urgency around patching application-layer vulnerabilities at scale, as attackers rapidly weaponize zero-day and n-day exploits across popular frameworks. The prevalence of automated exploitation and lateral expansion tactics reflects a shifting threat landscape that challenges traditional perimeter security and requires robust detection, segmentation, and rapid response capabilities.
Why This Matters Now
RondoDox’s exploitation of React2Shell highlights how botnets can rapidly weaponize critical application vulnerabilities, compromising widespread cloud-native environments with minimal interaction. The combination of automated scanning and aggressive persistence escalation demonstrates an urgent need for organizations to patch exposed services, isolate workloads, and implement proactive threat detection to counter a surge in similar high-velocity attacks.
Attack Path Analysis
RondoDox initiated its attack by exploiting the unauthenticated React2Shell RCE vulnerability on exposed Next.js servers to gain remote access. Post-compromise, malware achieved persistence and likely attempted privilege escalation by modifying system crontabs and terminating competing processes. The botnet then moved laterally, targeting other networked devices such as IoT and routers for broader enrollment. Established command and control channels were used to manage infected hosts and coordinate payload deployment. Although the primary focus was on bot enrollment and cryptomining, exfiltration avenues were maintained for outbound communications. Ultimately, RondoDox achieved impact by installing coinminers, persisting bot clients, and killing non-whitelisted processes, leading to resource hijacking and system instability.
Kill Chain Progression
Initial Compromise
Description
Attackers exploited the React2Shell (CVE-2025-55182) unauthenticated RCE vulnerability through crafted HTTP requests to gain remote execution access on vulnerable Next.js servers.
Related CVEs
CVE-2025-55182
CVSS 10A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0 through 19.2.0, including packages react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
Affected Products:
Meta React Server Components – 19.0.0, 19.1.0, 19.1.1, 19.2.0
Vercel Next.js – 15.0.0, 15.1.0, 15.2.0, 15.3.0, 15.4.0, 15.5.0, 15.6.0, 15.7.0, 15.8.0, 15.9.0, 16.0.0, 16.0.1, 16.0.2, 16.0.3, 16.0.4, 16.0.5, 16.0.6
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Command and Scripting Interpreter
Event Triggered Execution: Cron
Indicator Removal on Host: File Deletion
Ingress Tool Transfer
Resource Hijacking
Impair Defenses: Disable or Modify Tools
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Public-Facing Web Application Security
Control ID: 6.2.4
NYDFS 23 NYCRR 500 – Penetration Testing and Vulnerability Assessments
Control ID: 500.05
DORA (Digital Operational Resilience Act) – ICT Risk Management Framework
Control ID: Art. 9
CISA Zero Trust Maturity Model 2.0 – Network Segmentation and Isolation
Control ID: PR.AC-3.2
NIS2 Directive – Adoption of Basic Cyber Hygiene Practices
Control ID: Art. 21(2)d
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
RondoDox botnet exploiting React2Shell in Next.js servers poses critical risk to software development infrastructure requiring immediate patching and zero trust segmentation.
Information Technology/IT
IT services managing Next.js applications face severe botnet infiltration risks through CVE-2025-55182, demanding enhanced threat detection and kubernetes security controls.
Financial Services
Financial institutions using React-based applications vulnerable to remote code execution attacks enabling data exfiltration and compliance violations across HIPAA and PCI standards.
E-Learning
Educational platforms built on Next.js frameworks exposed to cryptomining malware deployment through unauthenticated RCE exploits requiring immediate application security hardening.
Sources
- RondoDox botnet exploits React2Shell flaw to breach Next.js servershttps://www.bleepingcomputer.com/news/security/rondodox-botnet-exploits-react2shell-flaw-to-breach-nextjs-servers/Verified
- RondoDox Botnet Exploiting React2Shell Vulnerabilityhttps://www.securityweek.com/rondodox-botnet-exploiting-react2shell-vulnerability/Verified
- Security Bulletin: IBM Rhapsody Systems Engineering is using next-15.4.7.tgz which is vulnerable to CVE-2025-55182https://www.ibm.com/support/pages/node/7255181Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, egress policy enforcement, lateral movement controls, and inline threat detection could have contained or prevented key kill chain stages by restricting access, observing anomalous actions, and blocking unauthorized C2 or malware downloads. Applying granular workload-by-workload segmentation with distributed real-time inspection mitigates botnet propagation and persistence.
Control: Cloud Native Security Fabric (CNSF) + Inline IPS (Suricata)
Mitigation: Signature-based inline IPS would detect/block exploit attempts targeting vulnerable services.
Control: Threat Detection & Anomaly Response
Mitigation: Automated baselining would alert on suspicious process and crontab modifications.
Control: Zero Trust Segmentation + East-West Traffic Security
Mitigation: Microsegmentation and strict identity-based access prevent unauthorized lateral propagation across network segments.
Control: Egress Security & Policy Enforcement
Mitigation: Outbound C2 traffic is blocked or flagged if not aligning with policy-approved destinations.
Control: Cloud Firewall (ACF) + Encrypted Traffic (HPE)
Mitigation: Deep packet inspection and egress filtering limit exfiltration channels.
Centralized monitoring quickly surfaces abnormal resource use or system instability for rapid remediation.
Impact at a Glance
Affected Business Functions
- Web Hosting
- E-commerce Platforms
- Content Management Systems
Estimated downtime: 5 days
Estimated loss: $500,000
Potential exposure of sensitive customer data, including personal information and payment details, due to unauthorized access facilitated by the vulnerability.
Recommended Actions
Key Takeaways & Next Steps
- • Immediately patch all public-facing React/Next.js frameworks and prioritize vulnerability management for internet-exposed services.
- • Enforce Zero Trust segmentation policies to isolate workloads and restrict east-west traffic, limiting botnet lateral movement.
- • Deploy inline IPS and Cloud Native Security Fabric controls to block exploit attempts and detect anomalous persistence tactics.
- • Implement strict egress controls and FQDN-based filtering to prevent unauthorized outbound C2, malware download, and data exfiltration.
- • Continuously monitor for unusual resource consumption and process activity, leveraging real-time threat intelligence and centralized incident response.



