At the start of 2025, cybersecurity watchers noticed a shift: a once obscure SIEM tool, Wazuh, became a prime target. A perilously serious flaw—designated CVE‑2025‑24016—was disclosed in mid-February. Within weeks, Mirai-based botnet operators repurposed a publicly released proof-of-concept exploit to gain remote code execution on vulnerable installations. What seemed like an academic vulnerability rapidly escalated into a two-front campaign compromising SIEM servers and deploying DDoS-ready malware.
Root of the Vulnerability: Unsafe Deserialization
The flaw lies in Wazuh’s DistributedAPI, which uses JSON for inter-node communication. Internally, JSON payloads are converted back to Python objects using as_wazuh_object. However, this deserializer failed to verify contents of the input dictionary first. By inserting a crafted exception descriptor (__unhandled_exc__), an attacker could exploit Python’s eval semantics to execute arbitrary code. In short, anyone with valid API credentials—or a compromised agent—could push malicious instructions without further restriction.
Wazuh’s Patch Path
Wazuh developers addressed the flaw by switching from dynamic eval to safer parsing via ast.literal_eval, which only handles benign data structures. This fix was bundled in version 4.9.1, released alongside a public advisory and PoC sample in February 2025. Yet, a troubling reality followed: patch lag among users created a fertile environment for exploitation.
Mirai Redux: Campaign One – “LZRD Family”
By early March 2025, Akamai’s honeynet sensors began receiving exploit attempts. These mirrored the exposed PoC, exploiting the /security/user/authenticate/run_as endpoint to launch shell commands that set up a downloader script on the target server. That script—typically called w.sh—retrieved Mirai binaries from an IP (e.g., 176.65.134.62) capable of infecting various CPU architectures (ARM, MIPS, x86). This iteration, dubbed “LZRD,” included payloads known as “morte,” “neon,” “vision,” and “V3G4”—each identified by unique console prints such as “lzrd here.”
These bots followed classic Mirai behavior: scanning for vulnerable IoT, embedding in systems with lax access controls, and turning them into DDoS minions. But what set this campaign apart was its unconventional launchpoint: enterprise-grade Wazuh servers. This allowed Mirai to infiltrate deeper networks that often wield more bandwidth than home routers.
Campaign Two – “Resbot” Strikes with Italian Flair
In early May, a second wave appeared, hitting a variant endpoint on Wazuh servers. The structure resembled the LZRD campaign but used different payload architecture and command scripts. Researchers spotted campaign nomenclature hinting at Italian influence: domains such as gestisciweb.com and versioneonline.com showed regional targeting. The malware payload, sometimes referred to as “resgod,” prints “Resentual got you!” on execution.
Beyond CVE‑2025‑24016, this variant also utilized older router exploits in campaign form, chaining injection on Huawei HG532, D‑Link, RealTek SDK, and ZyXEL devices. That meant a single exploit point could potentially seed multiple infections across diverse environments, from servers to home gateways.
Timeline of Escalation
| Date | Event |
|---|---|
| Feb 10 | Wazuh releases patch and PoC |
| Late Feb | PoC becomes publicly available via GitHub vulnerabilities repo |
| Early Mar | First Mirai engagement via PoC replication in global honeypots |
| Early May | Second campaign surfaces, Italian-themed, targeting same vulnerability |
| June 9–10 | Multiple outlets confirm both campaigns and IoC disclosures |
Technical Deep Dive: How Exploits Work
- Entry vector: Attackers send
POSTrequests to/security/user/authenticate/run_aswith Base64 authorization (oftenwazuh-wui:+ password derived from defaults or credential dumps). - Payload file: A JSON object containing crafted
__unhandled_exc__fields instructs Python to execute shell commands (wgetorcurl) that retrieve a downloader. - Stage 2 loader: The malicious script (
w.sh) fetches architecture-specific Mirai binaries and executes them. - Mirai execution: Infected server connects to C2 infrastructure and becomes part of the botnet’s DDoS network.
- Multi-target strategy: Some loaders include extra stages to compromise routers via FTP, telnet, or UPnP endpoints, chaining multiple exploits in one campaign.
Infrastructure & IoCs
- Downloader host:
176.65.134.62 - C2 domains (LZRD):
nuklearcnc.duckdns.org,cbot.galaxias.cc,neon.galaxias.cc,vision.galaxias.cc - Italian-themed C2 (Resbot):
gestisciweb.com,versioneonline.com,104.168.101.27:62627 - Router CVEs targeted: CVE‑2023‑1389 (TP-Link), CVE‑2017‑17215 (Huawei), CVE‑2017‑18368 (ZyXEL), RealTek SDK, UPnP SOAP injection
Why This Matters: A New Attack Vector
- SIEM server compromise – infecting Wazuh may allow adversaries to subvert monitoring while planting persistent backdoors.
- Payload versatility – payloads can transition from server to network layers by targeting routers and IoT devices.
- Rapid exploit adoption – entire botnets formed within weeks of PoC release, showcasing agile threat actor behavior.
- Multi-chain exploitation – combining new and old vulnerabilities to diversify infection paths.
- Regional targeting – Resbot’s domain choices hint at geo-tailored strategy, perhaps to avoid detection or segmentation.
Recommendations for Prevention
- Upgrade Wazuh to at least 4.9.1 immediately. Delaying exposes critical systems.
- Tighten API controls:
- Limit API access to internal subnets or via VPN
- Enforce end-user authentication and credential hygiene
- Set rate limits and alert thresholds
- Deploy IoC-based detection:
- Use YARA/Snort rules from Akamai and other vendors
- Monitor unusual download behavior pointing to C2 hosts
- Audit your edge:
- Make sure corporate routers, IoT devices, and UPnP endpoints aren’t reachable from the internet
- Confirm robust firmware and patch management for all network devices
- Penetration testing – simulate exploit chains to identify weak configurations before adversaries do
Real-World Response: Next Steps
- Conduct asset inventory to identify systems running Wazuh 4.4.0–4.9.0.
- Apply the 4.9.1 update across the board.
- Implement network segmentation and firewall rules to restrict API endpoints.
- Install detection rules for known IoCs — domains, IPs, script indicators.
- Check and patch network devices vulnerable to router-focused Mirai payloads.
- Set automated monitoring and alerting on script downloads to
/tmp, sudden service restarts, or unusual CPU usage. - Schedule regular threat simulation exercises, including deserialization-based exploit testing.
- Share detection routines internally and with external responders for collective defense.
Conclusion: From SIEM to Battlefield
Wazuh’s flaw turned from theoretical risk to active battlefield within weeks, fueled by Mirai’s adaptability. The campaigns targeting Wazuh illustrate a powerful adaptation: using enterprise security tools themselves as stealthy injection points for malware. The emerging Italian-centric Resbot campaign underscores how adversaries adapt regionally—not just technologically.
The key lesson? Patching and layered defenses aren’t optional—they’re urgent. Organizations must treat their visibility infrastructure (SIEMs, XDR, logging platforms) as high-value attack surfaces. Keeping those up to date, locked down, and monitored is as essential as locking down the routers and IoT endpoints they oversee.









Leave a comment