Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Zerobot Malware Targets Tenda Routers and n8n Platforms

Zerobot Malware Targets Tenda Routers and n8n Platforms

Posted on March 3, 2026 By CWS

A recent surge in malware activity has been identified by cybersecurity experts, revealing a renewed campaign by the Mirai-based botnet known as Zerobot. This campaign is specifically targeting vulnerabilities in Tenda AC1206 routers and the n8n workflow automation platform.

Exploitation of Tenda and n8n Vulnerabilities

Operating under its ninth iteration, zerobotv9, this campaign exploits newly disclosed command injection vulnerabilities to infiltrate exposed networks and devices. Zerobot’s origins trace back to 2022 as a Go-based malware targeting IoT devices. However, its latest version diverges from its predecessor, featuring a smaller, UPX-packed footprint with encrypted strings and a hard-coded command and control (C2) domain.

Research conducted by Akamai has identified active exploitation attempts of these vulnerabilities, captured through their global honeypot network since mid-January 2026. These attempts mark the first confirmed exploitation of these specific CVEs since their disclosure in 2025.

Details of the Vulnerabilities

The key vulnerabilities exploited include CVE-2025-7544, a critical stack-based buffer overflow in Tenda AC1206 devices, and CVE-2025-68613, a critical RCE flaw in n8n’s workflow system. The Tenda vulnerability allows for denial-of-service and remote code execution through improper handling of the deviceList parameter. Meanwhile, the n8n flaw exploits insufficient sandboxing, enabling attackers to execute arbitrary code and access sensitive data.

This campaign’s focus on n8n, alongside traditional IoT hardware, raises significant concerns due to n8n’s role in connecting databases and managing critical systems. A successful breach could facilitate lateral movement within an organization’s infrastructure.

Infection and Defense Strategies

Upon identifying a vulnerable device, Zerobot executes its exploit, compelling the device to download a malicious shell script, tol.sh, from a specific IP address. This script installs the main Zerobot payload, which is compatible with various CPU architectures, reflecting Mirai’s design for broad device compatibility.

The malware employs user-agent strings to evade detection and supports advanced attack methods, surpassing the capabilities of its earlier variants. Additionally, Zerobot targets other known vulnerabilities, employing fallback connection techniques to maintain resilience.

Organizations are urged to update Tenda firmware and n8n versions to mitigate risks. Network defenses should monitor and block identified malicious IPs and the C2 domain, while employing detection rules from Akamai for proactive threat management.

For continuous updates on this evolving threat, follow our coverage and ensure your network defenses are robust against such sophisticated cyber threats.

Cyber Security News Tags:Akamai, Botnet, command injection, CVE-2025-68613, CVE-2025-7544, cyber threat, Cybersecurity, IoT devices, Malware, Mirai-based malware, n8n vulnerabilities, network protection, network security, Tenda routers, Zerobot

Post navigation

Previous Post: Microsoft Unveils OAuth-Based Phishing Threat
Next Post: Archipelo and Checkmarx Forge AppSec Alliance

Related Posts

New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Domain Controllers into DDOS Botnet New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Domain Controllers into DDOS Botnet Cyber Security News
Dark Web Job Market Evolved Dark Web Job Market Evolved Cyber Security News
Conducting Risk Assessments That Drive Business Value Conducting Risk Assessments That Drive Business Value Cyber Security News
Want to Validate Alerts Faster? Use Free Threat Intelligence from 15K SOCs Want to Validate Alerts Faster? Use Free Threat Intelligence from 15K SOCs Cyber Security News
Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Cyber Security News
Critical Apache Syncope Vulnerability Exposes User Sessions Critical Apache Syncope Vulnerability Exposes User Sessions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark