HighData Breach

RondoDox Botnet Exploits React2Shell to Breach Next.js

Security researchers have identified an active campaign where the RondoDox botnet exploits the React2Shell vulnerability to compromise exposed Next.js servers. The attacks target misconfigured environments, allowing attackers to deploy malicious payloads and establish persistence. Organizations running vulnerable setups should act quickly to assess exposure, apply mitigations, and monitor for indicators of compromise.

Evan Mael
Evan Mael
39views
Framework targeted by the exploitation campaignNext.js
Vulnerability technique abused for command executionReact2Shell
Automated scanning and exploitation confirmedBotnet activity
Primary attack surfacePublicly exposed servers

Introduction

Security researchers have uncovered an active exploitation campaign involving the RondoDox botnet, which is leveraging the React2Shell vulnerability to compromise exposed Next.js servers.

What happened

The RondoDox botnet has been observed actively scanning the internet for servers vulnerable to React2Shell.

40+

Next.js servers confirmed compromised in this campaign

Key confirmed facts include:

  • The campaign targets publicly exposed Next.js servers
  • Exploitation relies on the React2Shell technique
  • Compromised systems deploy botnet components

Technical details

The RondoDox campaign uses this technique to:

  • Inject malicious commands via crafted HTTP requests
  • Download and execute secondary payloads
  • Modify system configurations for persistence

Recommended mitigations

Conclusion

Frequently Asked Questions

No. React2Shell is a known vulnerability pattern. Exploitation relies on exposed and misconfigured deployments rather than undisclosed flaws.

Managed platforms generally reduce exposure, but misconfigurations or custom deployments can still introduce risk.

Restrict public access to application servers and review deployment configurations to eliminate unnecessary exposure.

Incident Summary

Type
Data Breach
Severity
High
Published
Jan 1, 2026

Comments

Want to join the discussion?

Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.

Sign in