Zyxel network devices being mass exploited to spread Mirai botnet

Zyxel network devices being mass exploited to spread Mirai botnet

A new Mirai malware variant is targeting a recently patched vulnerability in Zyxel firewall appliances to compromise the devices and ensnare them into the botnet.

Tracked as CVE-2023-28771, the bug is an OS command injection issue that allows remotely execute OS commands on the target device by sending specially crafted packets. The vulnerability affects the following products:

  • ATP (firmware version 4.60 to 5.35 inclusive)

  • USG FLEX (firmware version 4.60 to 5.35 inclusive)

  • VPN (firmware version 4.60 to 5.35 inclusive)

  • ZyWALL/USG (firmware version 4.60 to 4.73 inclusive)

Zyxel released a firmware update (version 5.36) back in March to address the security issue.

Earlier this month, cybersecurity firm Rapid7 warned that this bug could be used in real-world attacks, adding that there are nearly 42,000 instances of Zyxel web interfaces exposed to the public internet. Not surprisingly, just a few days later reports have begun emerging about mass exploitation of CVE-2023-28771 by the Mirai botnet, with many SMB appliances being impacted.

Last week, the Taiwan-based vendor fixed two more remote code execution (RCE) vulnerabilities affecting its firewalls - CVE-2023-33009 and CVE-2023-33010.


Back to the list

Latest Posts

UNC6148 threat actor actively targets outdated and patched SonicWall devices

UNC6148 threat actor actively targets outdated and patched SonicWall devices

The group is using stolen credentials and OTP seeds to regain access to devices even after security updates have been applied.
17 July 2025
Google patches Chrome zero-day allowing sandbox escape

Google patches Chrome zero-day allowing sandbox escape

The flaw stems from insufficient validation of untrusted input in ANGLE and GPU.
16 July 2025
Ukrainian police dismantle major server network used for malware distribution

Ukrainian police dismantle major server network used for malware distribution

Authorities identified a 33-year-old French national as the organizer of the illegal operation.
16 July 2025