Threat Actors Ramp Up Exploitation of Widely Deployed Enterprise Technologies

May 9, 2025
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
External References
Subscribe to our Reports

Executive Summary

Recent exploitation patterns reveal a sharp shift toward targeting vulnerabilities in widely used business infrastructure. A total of six vulnerabilities have been added to the CISA KEV catalog this week, spanning a wide range of technologies and platforms. Among them are two flaws in end-of-life (EOL) GeoVision devices, alongside critical issues affecting Commvault Command Center, Langflow, the Yii PHP framework, and the FreeType library. Compounding the urgency, active exploitation has been observed in the wild for critical vulnerabilities in the Ottokit WordPress Plugin and the Samsung MagicINFO 9 Server, both of which are widely deployed and internet-facing. These developments stress the importance of proactive patching and the isolation or retirement of unsupported systems.  

Botnet activity surged as malware families like EnemyBot, Sysrv-K, Andoryu, and Androxgh0st exploited security flaws in platforms including Cloud Gateway, GitLab and various PHP-based systems. At the same time, IoT- focused threats such as Bashlite, BrickerBot, Tsunami, and Mirai intensified their targeting of Eir D1000 modems, accelerating the expansion of their botnet infrastructures.  

Threat actors are actively exploiting vulnerabilities in outdated and unpatched systems to deploy Mirai botnet variants and carry out targeted attacks. Discontinued GeoVision IoT devices have been compromised to support Mirai-powered DDoS activity, while a critical flaw in Samsung MagicINFO 9 Server is also being leveraged to deliver the same malware. Additionally, a recently patched Windows vulnerability has been exploited as a zero-day by threat actors linked to the Play ransomware group in a targeted attack on a U.S.-based organization.

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.  

CVE-2025-3248
A Missing Authentication Vulnerability in Langflow has been identified in the /api/v1/validate/code endpoint, allowing unauthenticated remote attackers to execute arbitrary code by sending specially crafted HTTP requests. This flaw rated 9.8 (critical) in severity, affects all Langflow versions prior to 1.3.0. The issue has been resolved in version 1.3.0. As per data from Censys, more than 470 Langflow instances are currently exposed to the internet, with the majority located in United States, Germany, Singapore, India and China. However, it remains uncertain how many of these systems have been updated to the patched version, raising concerns over potential exploitation. The availability of public proof-of-concept and the recent inclusion of this vulnerability in the CISA's Known Exploited Vulnerabilities (KEV) catalog further emphasizes the urgency of mitigation.

CVE-2025-27007
An Unauthenticated Privilege Escalation Vulnerability in the Ottokit WordPress Plugin (formerly known as SureTriggers), allows remote attackers to gain full administrative control of the affected websites without authentication. With a CVSS score of 9.8 (critical), it impacts plugin versions up to and including 1.0.82. This flaw stems from the create_wp_connection function, which is accessible via the plugin's REST API endpoint /wp-json/sure-triggers/v1/connection/create-wp-connection. Due to improper handling of authentication responses and inadequate token validation, attackers can exploit this endpoint by knowing only the administrator's username. Disclosed via Patchstack Zero Day bug bounty program, active exploitation was observed within an hour of its public disclosure. Wordfence has since released a patched version 1.0.83 and reported that its firewall has already blocked over 2,400 exploit attempts targeting this vulnerability.

CVE-2025-27363
An Out-of-Bounds Write Vulnerability in FreeType, an open-source font rendering library, which arises when parsing font subglyph structures associated with TrueType GX and variable font files. This flaw may permit local arbitrary code execution without requiring elevated privileges. With a high CVSS score of 8.1, this vulnerability poses a significant threat, especially given its confirmed exploitation in the wild, first reported by Facebook in March 2025. Google addressed the issue in its May 2025 Android security updates. The vulnerability has also been recently added to the CISA KEV catalog, underscoring the need for timely patching across affected systems.

CVE-2025-34028
A Path Traversal Vulnerability in the Commvault Command Center, allows remote unauthenticated attackers to execute arbitrary code on affected systems. This critical flaw carries the highest CVSS score of 10 and impacts versions 11.38.0 through 11.38.19. The issue has been addressed in patched releases 11.38.20 and 11.38.25. Security firm watchtower publicly disclosed technical details and released a proof-of-concept (PoC) exploit for the vulnerability, significantly increasing the risk of exploitation. Within a week of this disclosure, CISA included this vulnerability to its KEV catalog, reinforcing the need for immediate remediation.  

CVE-2024-6047
An OS Command Injection Vulnerability affecting GeoVision devices, enables a remote, unauthenticated attacker to inject and execute arbitrary system commands. With a critical CVSS score of 9.8, this flaw poses a severe risk to exposed systems. Notably, the impacted GeoVision products have reached end-of-life (EOL) and no longer receive security updates, further compounding the threat.  Akamai reports that this is the first observed instance of active exploitation since the vulnerability initial disclosure in June 2024. The vulnerability has been recently added to the CISA KEV catalog, acknowledging the exploitation activity and emphasizing the need for organizations to decommission or isolate vulnerable devices from accessible networks.  

CVE-2024-7399
A Path Traversal Vulnerability in the server component of Samsung MagicINFO9 allows attackers to write arbitrary files with system-level privileges. With a high CVSS score of 8.1, this issue affects versions prior to 21.1050.0, and Samsung addressed it in August 2024 with the release of MagicINFO version 21.1050. While no exploitation was initially reported at the time of disclosure, the release of a technical analysis and proof-of-concept exploit on April 30, 2025, triggered rapid exploitation in the wild. This surge in activity has significantly increased the risk to unpatched deployments, highlighting the urgency to applying the fix.

CVE-2024-11120
An OS Command Injection Vulnerability in the GeoVision devices allows remote, unauthenticated attackers to execute arbitrary system commands. With a critical CVSS score of 9.8, this flaw represents a significant threat to unpatched or exposed systems. Notably, the impacted GeoVision products have reached end-of-life (EOL) and no longer receive security updates, further compounding the threat. According to Akamai, active exploitation of this vulnerability has now been detected for the first time since its initial disclosure in November 2024. The vulnerability has been recently added to the CISA KEV catalog, urging organizations to either decommission the impacted devices or ensure they are properly isolated from accessible networks to prevent compromise.

CVE-2024-58136
An Improper Protection of Alternate Path Vulnerability in the Yii PHP Framework could allow remote attackers to execute arbitrary code. With a critical CVSS score of 9.0, this vulnerability affects versions prior to 2.0.52 and may impact other products built on Yii, such as Craft CMS. The vulnerability was exploited as a zero-day with attackers chaining it with other flaw, CVE-2025-32432, to gain unauthorized access to servers. It has since been patched in 2.0.52. Due to confirmed exploitation in the wild, it has also been added to the CISA KEV catalog, highlighting the immediate need for remediation.

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

CVE Product Severity Title Exploited – in the-wild CISA KEV
CVE-2024-47176 CUPS Medium Improper Input Validation Vulnerability in OpenPrinting CUPS browsed through 2.0.1 leads to remote code execution True False
CVE-2024-4577 PHP-CGI on Windows High Critical argument injection vulnerability in PHP on Windows servers True True
CVE-2024-3400 Palo Alto Networks PAN-OS Critical Command Injection Vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS True True
CVE-2024-27348 Apache HugeGraph-Server Critical Remote Command Execution vulnerability in Apache HugeGraph-Server True False
CVE-2024-1709 ConnectWise ScreenConnect Critical Authentication Bypass vulnerability in ConnectWise ScreenConnect through 23.9.7 leads to sensitive information disclosure True True
CVE-2023-4415 Ruijie RG-EW1200G 07161417 r483 High Improper Authentication vulnerability in Ruijie RG-EW1200G 07161417 r483 True False
CVE-2023-38646 Metabase open source and Enterprise Critical Remote Code Execution Vulnerability in Metabase open source and Metabase Enterprise True False
CVE-2023-24488 Citrix ADC and Citrix Gateway Medium Cross site scripting vulnerability in Citrix ADC and Citrix Gateway True False
CVE-2023-22527 Confluence Data Center and Server Critical Template injection vulnerability in Out-of-Date Versions of Confluence Data Center and Server leads to remote code execution True True
CVE-2023-26801 LB-LINK Critical Command injection vulnerability in LB-LINK devices. True False
CVE-2023-31192 SoftEther VPN Medium Information Disclosure vulnerability in the ClientConnect() functionality of SoftEther VPN False False

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

CVE Product Title Exploit Abused by Botnet
CVE-2022-22947 Spring Cloud Gateway Remote Code Execution Vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True EnemyBot
Sysrv-K
CVE-2021-22205 Gitlab-Exiftool Remote Code Execution Vulnerability in Gitlab-Exiftool True Andoryu
CVE-2017-9841 Util/PHP/eval-stdin.php in PHPUnit Arbitrary PHP Code Execution Vulnerability in PHPUnit before 4.8.28 and 5.x before 5.6.3 True AndroxGh0st
CVE-2016-10372 Eir D1000 modem Improper Protocol Access Control Vulnerability in Eir D1000 modem. True Bashlite
BrickerBot
Tsunami
Mirai

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.  

CVE-2025-29824

According to Symantec Threat Hunter Team, a recently patched Windows vulnerability, CVE-2025-29824, was exploited as zero-day by threat actors linked to the Play Ransomware group in a targeted attack against an undisclosed U.S. based organization. This flaw, found in the Common Log File System (CLFS) Driver, is a privilege escalation vulnerability that was addressed by Microsoft in a recent security update.  

Although no ransomware payload was observed in the attack, the intruders deployed Grixba, a custom infostealer tool tied to the Balloonfly group, known for operating the Play Ransomware. Balloonfly has been active since at least mid-2022, carrying out attacks on businesses and critical infrastructure across North America, South America, and Europe.

CVE-2024-6047 and CVE-2024-11120

In early April 2025, Akamai's Security Intelligence Response Team (SIRT) identified exploit activity targeting the /DateSetting.cgi endpoint across its honeypot network. The attack leverages command injection vulnerabilities: CVE-2024-6047 and CVE-2024-11120, affecting discontinued GeoVision IoT devices, specifically exploiting the szSrvIpAddr parameter to execute arbitrary commands without authentication. Although these vulnerabilities were initially disclosed in mid and late 2024, technical details were sparse, and no active exploitation had been publicly reported, until now. Attackers are leveraging this flaw to deploy an ARM-based Mirai variant called LZRD, which identifies itself via a unique console string and exhibits traits typical of other Mirai strains.  

CVE-2024-7399

Active exploitation has been observed targeting Samsung MagicINFO 9 Server, following a recent alert from the SANS Technology Institute. The vulnerability is an unauthenticated remote code execution flaw allows attackers to write arbitrary files as system authority, enabling the deployment of the Mirai botnet on compromised systems. To mitigate the risk of exploitation and ensure operational integrity, users are strongly advised to upgrade their Samsung MagicINFO 9 Server instances to version 21.1050 or newer.

CVE Severity Title Patch Targeted By Malware OSS
CVE-2025-29824 High Use-After-Free Vulnerability in the Microsoft Windows Common Log File System (CLFS) Driver Yes Play Ransomware
Grixba Infostealer
Balloonfly group
False
CVE-2024-6047 Critical OS Command Injection Vulnerability in the GeoVision devices No LZRD Mirai Malware False
CVE-2024-7399 High Path Traversal Vulnerability in the server component of Samsung MagicINFO 9 Yes Mirai False
CVE-2024-11120 Critical OS Command Injection Vulnerability in the GeoVision devices No LZRD Mirai Malware False

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of Vulnerability Product Reference
CVE-2025-22411 Remote Code Execution Android Resource
CVE-2025-22442 Elevation of Privilege Android Resource
CVE-2025-22873 Path Traversal Golang Resource
CVE-2025-26416 Elevation of Privilege Android Resource

External References

  1. https://www.cisa.gov/news-events/alerts/2025/05/07/cisa-adds-two-known-exploited-vulnerabilities-catalog
  2. https://www.security.com/threat-intelligence/play-ransomware-zero-day
  3. https://patchstack.com/articles/additional-critical-ottokit-formerly-suretriggers-vulnerability-patched/  
  4. https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/
  5. https://isc.sans.edu/diary/31920  
  6. https://www.cisa.gov/news-events/alerts/2025/05/02/cisa-adds-two-known-exploited-vulnerabilities-catalog  
  7. https://www.zscaler.com/blogs/security-research/cve-2025-3248-rce-vulnerability-langflow

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports