Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit React2Shell Vulnerability in Next.js Servers

Hackers Exploit React2Shell Vulnerability in Next.js Servers

Posted on April 3, 2026 By CWS

In a recent large-scale cyberattack, over 700 web servers running Next.js have been compromised. This surge in attacks has been linked to a hacker group known as UAT-10608, according to cybersecurity experts at Cisco Talos. The attackers have been exploiting a significant security vulnerability called React2Shell, targeting web applications worldwide.

Exploiting React2Shell for Remote Code Execution

The React2Shell vulnerability, identified as CVE-2025-55182, is a critical remote code execution flaw in React Server Components. Attackers leverage this flaw to send crafted web requests to vulnerable servers, leading to unauthorized execution of hidden commands due to inadequate data validation by the server. Worryingly, this attack does not require passwords or user interaction, making it particularly dangerous.

The hacker group employs automated tools to identify and exploit susceptible Next.js servers. Upon finding a target, they deploy the React2Shell exploit to gain unauthorized access, followed by the installation of a malicious script.

Mass Credential Theft and NEXUS Listener

This malicious script operates silently, scanning server files, cloud configurations, and system memory to extract sensitive credentials. These include cloud tokens, database passwords, and more, which are then transmitted to the attackers’ command-and-control server.

To manage the extensive volume of stolen data, the hackers utilize a specialized web dashboard named ‘NEXUS Listener’. Cisco Talos researchers discovered that this tool documented 766 compromised hosts within just a day. The data revealed that over 90% of these hosts had their database credentials pilfered, and nearly 80% lost crucial SSH keys.

Implications and Urgent Response

The ramifications of these breaches are severe. With stolen credentials, attackers can access private user data, financial records, and even take control of entire cloud environments. The compromised SSH keys enable lateral movement across different servers, while stolen GitHub tokens pose a risk of malicious code insertion into software updates.

Organizations using Next.js must act swiftly to mitigate these risks. Immediate patching of the React2Shell vulnerability is crucial. Additionally, companies should change all passwords, API keys, and security tokens if they suspect being targeted. Restricting access to cloud metadata services and monitoring for unusual server activities are also recommended actions.

Stay informed on the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:Cisco Talos, cloud security, credential theft, CVE-2025-55182, Cybersecurity, Next.js, NEXUS Listener, React2Shell, remote code execution, SSH keys, UAT-10608

Post navigation

Previous Post: ShareFile Flaws Enable Unauthenticated Remote Code Execution
Next Post: React2Shell Exploitation: Large-Scale Attack Exposes Credentials

Related Posts

Building a Cyber-Resilient Organization CISOs Roadmap Building a Cyber-Resilient Organization CISOs Roadmap Cyber Security News
Women’s Dating App Tea Exposes Selfie Images of 13,000 Users Women’s Dating App Tea Exposes Selfie Images of 13,000 Users Cyber Security News
0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets 0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets Cyber Security News
Microsoft Outlook’s New Two-Click View for Encrypted Emails Protects From Accidental Exposure Microsoft Outlook’s New Two-Click View for Encrypted Emails Protects From Accidental Exposure Cyber Security News
Cybersecurity Industry Gains .7 Billion to Develop Cutting-Edge Protection Technologies Cybersecurity Industry Gains $1.7 Billion to Develop Cutting-Edge Protection Technologies Cyber Security News
FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Steal $285M from DeFi Platform
  • Kimsuky Uses LNK Files to Deploy Python Backdoor
  • React2Shell Exploitation: Large-Scale Attack Exposes Credentials
  • Hackers Exploit React2Shell Vulnerability in Next.js Servers
  • ShareFile Flaws Enable Unauthenticated Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Steal $285M from DeFi Platform
  • Kimsuky Uses LNK Files to Deploy Python Backdoor
  • React2Shell Exploitation: Large-Scale Attack Exposes Credentials
  • Hackers Exploit React2Shell Vulnerability in Next.js Servers
  • ShareFile Flaws Enable Unauthenticated Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark