Mirai-based Botnets Exploit CVE-2025-1316 Zero-Day in Edimax IP Cameras

Security experts have discovered a devastating zero-day exploit, tracked as CVE-2025-1316, being used by Mirai-based botnets to gain remote command execution on Edimax IC-7100 IP cameras. The vulnerability, classified with a CVSS score of 9.8, allows attackers to inject malicious requests into the camera's system, potentially leading to catastrophic consequences.

The issue at hand is an improper neutralization of special elements used in an operating system command, commonly known as OS Command Injection. This flaw is made worse by Edimax IC-7100 IP cameras failing to properly sanitize requests, making it easy for attackers to craft specially designed requests that can execute arbitrary code on the device.

According to a warning issued by the US Cybersecurity and Infrastructure Security Agency (CISA), successful exploitation of this vulnerability could enable an attacker to send malicious requests that result in remote code execution on the device. The agency advises organizations to follow established internal procedures and report any suspected malicious activity to CISA for tracking and correlation with other incidents.

The vulnerability affects all C-7100 IP Camera versions, but it's worth noting that these cameras are end-of-life products, making it difficult for vendors to provide patches or updates. The vendor was notified in October 2024, but has been unresponsive to CISA and Akamai researchers.

Akamai researchers were the first to discover the vulnerability, and they have confirmed that multiple Mirai-based botnets are currently exploiting this flaw. These botnets use remote command execution to download a Mirai malware payload from a remote server.

Threat actors are taking advantage of this vulnerability to further their malicious goals. Experts warn that organizations should be on high alert for suspicious activity and report any concerns to CISA or Akamai immediately.

Follow me on Twitter: @securityaffairs and stay updated on the latest security news and alerts.

Stay Safe Online:

If you are using an Edimax IC-7100 IP camera, it is essential to take immediate action to protect yourself from this vulnerability. Here are some steps you can take:

* Report any suspicious activity to CISA or Akamai immediately * Update your device to the latest version of firmware if possible * Use strong passwords and two-factor authentication to prevent unauthorized access * Regularly monitor your system for signs of malicious activity

By staying informed and taking proactive measures, you can significantly reduce the risk of falling victim to this devastating zero-day exploit.

Follow me on Facebook and stay updated on the latest security news and alerts. You can also join my community on Mastodon to stay informed about the latest security threats.

Get the Latest Security Updates:

Stay ahead of the curve by following us on social media and subscribing to our newsletter. We will provide you with the latest security news, tips, and alerts to help you protect yourself from emerging threats.