WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

824

Archive: https://archive.today/zT9l3

From the post:

>A new botnet campaign is exploiting a high-severity security flaw in unpatched TP-Link routers and has already spread to more than 6,000 devices. According to a new report from the Cato CTRL team, the Ballista botnet exploits a remote code execution vulnerability that directly impacts the TP-Link Archer AX-21 router. The botnet can lead to command injection which then makes remote code execution (RCE) possible so that the malware can spread itself across the internet automatically. This high severity security flaw (tracked as CVE-2023-1389) has also been used to spread other malware families as far back as April 2023 when it was used in the Mirai botnet malware attacks. The flaw also linked to the Condi and AndroxGh0st malware attacks.

Archive: https://archive.today/zT9l3 From the post: >>A new botnet campaign is exploiting a high-severity security flaw in unpatched TP-Link routers and has already spread to more than 6,000 devices. According to a new report from the Cato CTRL team, the Ballista botnet exploits a remote code execution vulnerability that directly impacts the TP-Link Archer AX-21 router. The botnet can lead to command injection which then makes remote code execution (RCE) possible so that the malware can spread itself across the internet automatically. This high severity security flaw (tracked as CVE-2023-1389) has also been used to spread other malware families as far back as April 2023 when it was used in the Mirai botnet malware attacks. The flaw also linked to the Condi and AndroxGh0st malware attacks.

Be the first to comment!