Discovery of Persistent Cybersecurity Campaign
Cybersecurity researchers have recently disclosed details of a persistent nine-month-long campaign targeting Internet of Things (IoT) devices and web applications. This campaign has enrolled these devices and applications into a botnet known as RondoDox.
Initial Access Vector: React2Shell Flaw
The activity has been observed leveraging the recently disclosed CVE-2025-55182">React2Shell (CVE-2025-55182) flaw as an initial access vector. According to CloudSEK, this vulnerability has a CVSS score of 10.0.
Impact and Scope
This campaign has had a significant impact on various sectors, including industrial control systems, smart homes, and web applications. The hijacked devices and servers can be used for a variety of malicious activities, such as distributed denial-of-service (DDoS) attacks, data exfiltration, and further propagation of malware.
Threat Analysis
The threat type identified in this case is a vulnerability. The React2Shell flaw represents a critical security weakness that could be exploited by attackers to gain unauthorized access to systems. This vulnerability’s CVSS score of 10.0 indicates that it poses an extremely high risk to any system vulnerable to this exploit.
Mitigation and Prevention
Organizations are advised to immediately patch the React2Shell flaw to mitigate this threat. Additionally, implementing robust cybersecurity measures such as firewalls, intrusion detection systems, and regular security audits can help prevent such attacks from succeeding. It is also crucial to maintain up-to-date software and firmware for all devices and applications.
Conclusion
The RondoDox botnet campaign exploiting the React2Shell flaw highlights the importance of timely vulnerability patches and comprehensive cybersecurity strategies in protecting against advanced threats. Organizations must remain vigilant and proactive in their efforts to safeguard their digital assets.



