HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High ThreatIntel

Mirai Variant “tuxnokill” Exploits D‑Link DIR‑823X Router (CVE‑2025‑29635) and Other IoT Devices, Fueling Large‑Scale DDoS Botnet

Researchers have identified two fresh Mirai‑derived botnet variants—tuxnokill and Nexcorium—leveraging known IoT vulnerabilities to conscript routers and DVRs into a DDoS‑capable network. The campaigns underscore the persistent risk of unpatched consumer‑grade hardware within enterprise supply chains.

LiveThreat™ Intelligence · 📅 April 23, 2026· 📰 helpnetsecurity.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
5 recommended
📰
Source
helpnetsecurity.com

Mirai Variant “tuxnokill” Exploits D‑Link DIR‑823X Router (CVE‑2025‑29635) and Other IoT Devices, Fueling Large‑Scale DDoS Botnet

What It Is – A newly observed Mirai‑derived botnet variant, dubbed tuxnokill, weaponizes a command‑injection flaw (CVE‑2025‑29635) in D‑Link DIR‑823X routers. A parallel campaign (Nexcorium) targets TP‑Link, ZTE routers and TBK DVRs, adding persistence mechanisms and a legacy Huawei exploit.

Exploitability – Public PoC for CVE‑2025‑29635 existed for over a year; attackers now use a modified exploit. Active exploitation is confirmed in the wild, with botnet nodes launching DDoS attacks. CVSS (estimated) ≈ 8.8 (High).

Affected Products – D‑Link DIR‑823X routers (CVE‑2025‑29635), TP‑Link Archer AX21 (CVE‑2023‑1389), ZTE ZXV10 H108L routers (public exploit), TBK digital video recorders (CVE‑2024‑3721), and legacy Huawei devices (CVE‑2017‑17215).

TPRM Impact – Compromised third‑party IoT assets can be conscripted into DDoS botnets, threatening service availability for downstream customers and exposing supply‑chain partners to reputational damage and regulatory scrutiny.

Recommended Actions

  • Conduct an inventory of all IoT, router, and DVR assets in the vendor ecosystem.
  • Verify firmware is up‑to‑date; apply patches for CVE‑2025‑29635, CVE‑2023‑1389, CVE‑2024‑3721, and any legacy CVEs.
  • Enforce network segmentation for unmanaged IoT devices.
  • Deploy outbound traffic monitoring to detect abnormal DDoS‑related traffic from vendor‑owned hardware.
  • Require vendors to adopt a vulnerability‑management SLA that includes rapid patch deployment for IoT firmware.

Source: Help Net Security

📰 Original Source
https://www.helpnetsecurity.com/2026/04/22/new-mirai-variants-target-routers-and-dvrs-via-old-flaws/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.