Zyxel network devices being mass exploited to spread Mirai botnet

Zyxel network devices being mass exploited to spread Mirai botnet

A new Mirai malware variant is targeting a recently patched vulnerability in Zyxel firewall appliances to compromise the devices and ensnare them into the botnet.

Tracked as CVE-2023-28771, the bug is an OS command injection issue that allows remotely execute OS commands on the target device by sending specially crafted packets. The vulnerability affects the following products:

  • ATP (firmware version 4.60 to 5.35 inclusive)

  • USG FLEX (firmware version 4.60 to 5.35 inclusive)

  • VPN (firmware version 4.60 to 5.35 inclusive)

  • ZyWALL/USG (firmware version 4.60 to 4.73 inclusive)

Zyxel released a firmware update (version 5.36) back in March to address the security issue.

Earlier this month, cybersecurity firm Rapid7 warned that this bug could be used in real-world attacks, adding that there are nearly 42,000 instances of Zyxel web interfaces exposed to the public internet. Not surprisingly, just a few days later reports have begun emerging about mass exploitation of CVE-2023-28771 by the Mirai botnet, with many SMB appliances being impacted.

Last week, the Taiwan-based vendor fixed two more remote code execution (RCE) vulnerabilities affecting its firewalls - CVE-2023-33009 and CVE-2023-33010.


Back to the list

Latest Posts

Cyber Security Week in Review: May 9, 2025

Cyber Security Week in Review: May 9, 2025

In brief: SAP zero-day exploited by Chinese hackers, SonicWall patches bugs in its SMA appliances, and more.
9 May 2025
Russia-linked Coldriver hackers deploy new espionage malware in targeted attacks

Russia-linked Coldriver hackers deploy new espionage malware in targeted attacks

LOSTKEYS is designed to steal sensitive files, harvest system information, and exfiltrate details about running processes.
8 May 2025
Russia-aligned operation manipulates audio and images to impersonate experts

Russia-aligned operation manipulates audio and images to impersonate experts

The operation primarily focused on undermining NATO support for Ukraine and spreading false narratives to disrupt domestic politics in EU member states.
7 May 2025