Zero-Days and Active Exploits Dominate This Week’s Cyber Landscape

September 26, 2025
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
External References
Subscribe to our Reports

Executive Summary

This week underscored the growing risk from zero-day exploitation, with multiple high-impact vulnerabilities confirmed under active attack. CISA added three vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog two in Cisco software and one in Google Chrome all confirmed as zero-days. Beyond these, Libraesva confirmed targeted exploitation of a critical flaw in its Email Security Gateway, while researchers observed ongoing abuse of a Server-Side Request Forgery vulnerability in the Linux utility JGM Pandoc. Cisco’s IOS XE Software was also confirmed to be under active attack, underscoring the persistent focus of adversaries on enterprise-critical infrastructure.

Botnet activity has seen a sharp escalation, with EnemyBot, Sysrv-k, Andoryu, and Androxgh0st actively exploiting vulnerabilities in GitLab, cloud gateways, and PHP-based applications. Meanwhile, IoT-centric botnets such as Mirai, Bashlite, Tsunami, and BrickerBot are ramping up their campaigns, specifically targeting EirD1000 routers to gain persistence and facilitate lateral movement across networks.  

ESET researchers have reported HybridPetya, a Petya/NotPetya-inspired ransomware that continues the evolution of earlier strains by leveraging a vulnerability to compromise UEFI-based systems. Threat activity also persists, with attackers exploiting a flaw in LILIN DVRs to spread botnets like Chalubo, FBot, and Moobot. In addition, the ongoing exploitation of a SonicWall vulnerability remains a concern, as it has been directly linked to Akira ransomware intrusions targeting Australian organizations.

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.  

CVE-2025-10585
A Type Confusion Vulnerability has been identified in the V8 JavaScript and WebAssembly engine, posing a serious security risk. Successful exploitation of this flaw could enable a remote attacker to bypass the browser’s security sandbox by luring users into visiting a specially crafted malicious webpage. Google has addressed the issue by releasing a new stable channel update, version 140.0.7339.185/.186 for Windows and Mac and 140.0.7339.185 for Linux. While Google has acknowledged that this vulnerability has been exploited as a zero-day in the wild, it has not disclosed any details regarding active campaigns linked to the attacks. The vulnerability has also been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog.

CVE-2025-20333
A Buffer Overflow vulnerability has been discovered in the Cisco Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) Software VPN Web Server. The issue arises from improper validation of user-supplied input in HTTP(S) requests and could allow remote attackers with valid VPN credentials to execute arbitrary code as root, potentially leading to complete device compromise. Cisco’s Product Security Incident Response Team (PSIRT) confirmed that the flaw is already being exploited in the wild and cautioned that it may be chained with CVE-2025-20362 for increased impact. Both vulnerabilities have been added to CISA KEV catalog, and Cisco strongly urges customers to upgrade to a fixed software release to mitigate the risk.

CVE-2025-20352
A Denial of Service and Remote Code Execution Vulnerability has been identified in Cisco IOS and IOS XE software, caused by a stack overflow condition in the SNMP subsystem. Exploitation could allow a low-privileged attacker to force a system reload, resulting in a DoS, or enable a high-privileged attacker to execute arbitrary code as the root user, gaining full control of the device. This high severity vulnerability affects all versions of SNMP, and while Cisco has released software updates and mitigation guidance, no direct workarounds exist. Cisco PSIRT has confirmed active exploitation in the wild, where attackers leveraged compromised local Administrator credentials to target vulnerable systems.  

CVE-2025-20362
A Missing Authorization vulnerability has been identified in the Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server. The flaw arises from improper validation of user-supplied input in HTTP(S) requests and could allow an unauthenticated, remote attacker to access restricted URL endpoints without proper authentication. By sending crafted HTTP requests, attackers may exploit this weakness to bypass security controls. Cisco’s Product Security Incident Response Team (PSIRT) has confirmed that the flaw is already being actively targeted and warned that it could be chained with CVE-2025-20333 for greater impact. Both vulnerabilities have also been added to CISA KEV catalog, and Cisco continues to strongly recommend that customers upgrade to a fixed software release to ensure remediation.

CVE-2025-51591
A Server-Side Request Forgery (SSRF) Vulnerability, has been identified in the Linux utility JGM Pandoc, allowing attackers to inject a crafted iframe and potentially compromise entire cloud infrastructures. Security firm Wiz reported that the flaw has been exploited in the wild to target Amazon Web Services (AWS) Instance Metadata Service (IMDS), particularly EC2 instances relying on the older IMDSv1, which exposes sensitive metadata and temporary credentials. Pandoc maintainers confirmed that iframe rendering is intended behavior, placing responsibility on users to sanitize input or apply options such as “-f html+raw_html” or “--sandbox” to block malicious iframe content. To mitigate risks, organizations are advised to enforce IMDSv2, apply the principle of least privilege (PoLP) for IAM roles, and patch vulnerable third-party software to reduce exposure.

CVE-2025-59689
A Command Injection Vulnerability via a compressed email attachment in the Libraesva Email Security Gateway (ESG) allows attackers to execute arbitrary shell commands. This flaw stems from improper sanitization of files within certain archive formats, enabling attackers to bypass input validation and inject commands. The issue affects versions 4.5 through 5.5.x prior to 5.5.7. Successful exploitation allows execution of shell commands under a non-privileged account, which could then be leveraged for persistence, lateral movement, or privilege escalation. Libraesva confirmed that this vulnerability has already been abused in one targeted incident, likely conducted by a foreign hostile state, with the attack focusing on a single appliance rather than a broad-scale financial crime campaign.

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerabilities Product Severity Title Exploited – in the-wild CISA KEV
CVE-2025-5777 Citrix NetScaler ADC and NetScaler Gateway Critical Out-of-Bounds Read Vulnerability in Citrix NetScaler ADC and NetScaler Gateway True True
CVE-2025-31324 SAP NetWeaver Critical An Unrestricted Vulnerability in the SAP NetWeaver True True
CVE-2024-47176 CUPS Medium Improper Input Validation Vulnerability in OpenPrinting CUPS browsed through 2.0.1 leads to remote code execution True False
CVE-2024-4577 PHP-CGI on Windows High Critical Argument Injection Vulnerability in PHP on Windows servers True True
CVE-2024-3721 TBK DVR Devices Medium OS Command Injection Vulnerability in TBK DVR-4104 and DVR-4216 up to 20240412 False False
CVE-2024-3400 Palo Alto Networks PAN-OS Critical Command Injection Vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS True True
CVE-2024-29269 Telesquare TLR-2005Ksh High Unauthorized Remote Command Execution Vulnerability found in Telesquare TLR-2005Ksh versions 1.0.0 and 1.1.4. False False
CVE-2024-1709 ConnectWise ScreenConnect Critical Authentication Bypass Vulnerability in ConnectWise ScreenConnect through 23.9.7 leads to sensitive information disclosure True True
CVE-2023-38646 Metabase open source and Enterprise Critical Remote Code Execution Vulnerability in Metabase open source and Metabase Enterprise True False
CVE-2023-26801 LB-LINK Critical Command Injection Vulnerability in LB-LINK devices. True False
CVE-2022-34045 Wavlink devices Critical Hardcoded Encryption/Decryption Key Vulnerability in Wavlink WN530HG4 M30HG4.V5030.191116 False False
CVE-2022-30075 TP-Link Router High Improper Validation Vulnerability in TP-Link Router leads to remote code execution True False
CVE-2022-41040 Microsoft Exchange Server High Server-Side Request Forgery Vulnerability in Microsoft Exchange Server True True

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2022-22947 Spring Cloud Gateway Remote Code Execution Vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True EnemyBot
Sysrv-K
CVE-2021-22205 Gitlab-Exiftool Remote Code Execution Vulnerability in Gitlab-Exiftool True Andoryu
CVE-2017-9841 Util/PHP/eval-stdin.php in PHPUnit Arbitrary PHP Code Execution Vulnerability in Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 True AndroxGh0st
CVE-2016-10372 Eir D1000 modem Improper Protocol Access Control Vulnerability in Eir D1000 modem. True Bashlite
BrickerBot
Tsunami
Mirai

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.      

CVE-2025-34130
360Netlab reported that since August 2019, its unknown threat detection system has observed multiple groups exploiting a zero-day vulnerability in LILIN DVRs to distribute botnets such as Chalubo, FBot, and Moobot. The exploited vulnerability is an arbitrary file read issue in /z/zbin/net_html.cgi. In February 2020, the manufacturer addressed the issue and released the firmware program 2.0b60_20200207 to patch the vulnerabilities. These findings underscore how unpatched or poorly secured IoT devices can become a persistent attack vector, fueling botnet operations for years.

CVE-2024-40766
The Australian Cyber Security Centre (ACSC) has issued an alert regarding the active exploitation of CVE-2024-40766, a critical vulnerability in SonicWall SSL VPNs that has been directly linked to Akira ransomware intrusions against Australian organizations. The flaw affects Gen 5, Gen 6, and Gen 7 SonicWall devices running vulnerable SonicOS versions, and successful exploitation can grant attackers unauthorized access to corporate networks or even crash the firewall, escalating the impact. According to the ACSC, threat actors are actively leveraging this weakness, with Akira ransomware groups increasingly using VPN vulnerabilities as entry points. Considering this, the agency is urging all organizations to immediately patch their devices, stressing that the latest security builds are available for download via mysonicwall.com.

CVE-2024-7344
ESET researchers uncovered HybridPetya on VirusTotal, a Petya/NotPetya-style ransomware that extends those tactics to UEFI-based systems by weaponizing CVE-2024-7344, the vulnerable Howyar reloader.efi loader. On unpatched machines the malware's installer drops a bootkit into the EFI System Partition that includes a modified bootloader, fallback loader, config/validation files, an exploit payload container, often delivered as an XOR-obfuscated cloak.dat) and a status file; the bootkit uses a three-state flag (0 = ready, 1 = encrypted, 2 = decrypted after ransom) and a \EFI\Microsoft\Boot\counter to track encrypted clusters. Its core routine encrypts the NTFS Master File Table (MFT) with Salsa20 while displaying a fake CHKDSK message to hide activity. Victims receive a ransom demand (US$1,000 in Bitcoin) and can enter a purchased key to trigger staged decryption and restoration of backed-up bootloaders; unlike NotPetya, HybridPetya can reconstruct decryption keys from installation artifacts. Selected variants exploit the insecure loading behavior of reloader.efi (renamed as bootmgfw.efi) to bypass Secure Boot, a deficiency Microsoft addressed by revoking the vulnerable binaries in its January 2025 update.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2025-34130 High An Unauthenticated Arbitrary File Vulnerability in LILIN Digital Video Recorder (DVR) Yes Chalubo Botnet, FBot Botnet, Moobot Botnet False
CVE-2024-40766 Critical An Improper Access Control Vulnerability in the SonicWall SonicOS Yes Akira Ransomware False
CVE-2024-7344 High A Remote Code Execution Vulnerability in the Howyar Reloader UEFI application Yes HybridPetya Ransomware False

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of vulnerability Product Reference
CVE-2025-9125 Cross-site Scripting Lectora Course Navigation Resource
CVE-2025-10892 Integer Overflow Chrome V8 Engine Resource
CVE-2025-59688 Improper Input Validation BIRD Internet Routing Daemon Resource
CVE-2025-57877 Cross-site Scripting Portal for ArcGIS Security 2025 Update 3 Patch Resource

External References

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports