Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026

      Ashley St. Clair, the mother of one of Elon Musk’s children, sues xAI over Grok sexual images

      January 17, 2026

      Anthropic joins OpenAI’s push into health care with new Claude tools

      January 12, 2026
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      $200 Million Deployed: Why Binance’s Bitcoin Conversions Haven’t Moved the Market

      February 4, 2026

      One Bitcoin Chart Correctly Predicts the 5% Bounce — But 3 Metrics Now Question It

      February 4, 2026

      Tether’s $500 Billion Fundraising Retreat Stokes Speculation—Is an IPO Ever Coming?

      February 4, 2026

      BitMine Faces Over $6 Billion in Unrealized Losses, but Tom Lee Says It’s Part of the Plan

      February 4, 2026

      Why Bitcoin’s Defense of $76,000 Matters for MicroStrategy’s Q4 Earnings Narrative

      February 4, 2026
    • Technology

      9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

      February 4, 2026

      I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

      February 4, 2026

      Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

      February 4, 2026

      We Retested Every Meal Kit Service. This Underdog Is Our New Favorite in 2026

      February 4, 2026

      Today’s NYT Connections: Sports Edition Hints and Answers for Feb. 4, #499

      February 4, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable
    Technology

    React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable

    TechAiVerseBy TechAiVerseDecember 6, 2025No Comments5 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable

    Over 77,000 Internet-exposed IP addresses are vulnerable to the critical React2Shell remote code execution flaw (CVE-2025-55182), with researchers now confirming that attackers have already compromised over 30 organizations across multiple sectors.

    React2Shell is an unauthenticated remote code execution vulnerability that can be exploited via a single HTTP request and affects all frameworks that implement React Server Components, including Next.js, which uses the same deserialization logic.

    React disclosed the vulnerability on December 3, explaining that unsafe deserialization of client-controlled data inside React Server Components enables attackers to trigger remote, unauthenticated execution of arbitrary commands.

    Developers are required to update React to the latest version, rebuild their applications, and then redeploy to fix the vulnerability.

    On December 4, security researcher Maple3142 published a working proof-of-concept demonstrating remote command execution against unpatched servers. Soon after, scanning for the flaw accelerated as attackers and researchers began using the public exploit with automated tools.

    Over 77,000 vulnerable IP addresses

    Shadowserver Internet watchdog group now reports that it has detected 77,664 IP addresses vulnerable to the React2Shell flaw, with approximately 23,700 in the United States.

    Geographic distribution of vulnerable IP addresses
    Source: ShadowServer

    The researchers determined that IP addresses were vulnerable using a detection technique developed by Searchlight Cyber/Assetnote, where an HTTP request was sent to servers to exploit the flaw, and a specific response was checked to confirm whether a device was vulnerable. 

    GreyNoise also recorded 181 distinct IP addresses attempting to exploit the flaw over the past 24 hours, with most of the traffic appearing automated. The researchers say the scans are primarily originating from the Netherlands, China, the United States, Hong Kong, and a small number of other countries.

    Unique IP addresses observed scanning for React2Shell
    Source: Greynoise

    Palo Alto Networks reports that more than 30 organizations have already been compromised through the React2Shell flaw, with attackers exploiting the vulnerability to run commands, conduct reconnaissance, and attempt to steal AWS configuration and credential files.

    These compromises include intrusions linked to known state-associated Chinese threat actors.

    Widespread exploitation of React2Shell

    Since its disclosure, researchers and threat intelligence companies have observed widespread exploitation of the CVE-2025-55182 flaw.

    GreyNoise reports that attackers frequently begin with PowerShell commands that perform a basic math function to confirm the device is vulnerable to the remote code execution flaw.

    These tests return predictable results while leaving minimal signs of exploitation:

    powershell -c "40138*41979"
    powershell -c "40320*43488"

    Once remote code execution was confirmed, attackers were seen executing base64-encoded PowerShell commands that download additional scripts directly into memory. 

    powershell -enc 

    One observed command executes a second-stage PowerShell script from the external site (23[.]235[.]188[.]3), which is used to disable AMSI to bypass endpoint security and deploy additional payloads.

    According to VirusTotal, the PowerShell script observed by GreyNoise installs a Cobalt Strike beacon on the targeted device, giving threat actors a foothold on the network.

    Amazon AWS threat intelligence teams also saw rapid exploitation hours after the disclosure of the React CVE-2025-55182 flaw, with infrastructure associated with China-linked APT hacking groups known as Earth Lamia and Jackpot Panda. 

    In this exploitation, the threat actors perform reconnaissance on vulnerable servers by using commands such as whoami and id, attempting to write files, and reading /etc/passwd.

    Palo Alto Networks also observed similar exploitation, attributing some of it to UNC5174, a Chinese state-sponsored threat actor believed to be tied to the Chinese Ministry of State Security.

    “Unit 42 observed threat activity we assess with high confidence is consistent with CL-STA-1015 (aka UNC5174), a group suspected to be an initial access broker with ties to the Chinese Ministry of State Security,” Justin Moore, Senior Manager at Palo Alto Networks Unit 42, told BleepingComputer via email.

    “In this activity, we observed the deployment of Snowlight and Vshell malware, both highly consistent with Unit 42 knowledge of CL-STA-1015 (also known as UNC5174).”

    The deployed malware in these attacks is:

    • Snowlight: A malware dropper that allows remote attackers to drop additional payloads on breached devices.
    • Vshell: A backdoor commonly used by Chinese hacking groups for remote access, post-exploitation activity, and to move laterally through a compromised network.

    The rush to patch

    Due to the severity of the React flaw, companies worldwide have rushed to install the patch and apply mitigations.

    Yesterday, Cloudflare rolled out emergency detections and mitigations for the React flaw in its Web Application Firewall (WAF) due to its widespread exploitation and severity.

    However, the update inadvertently caused an outage affecting numerous websites before the rules were corrected. 

    CISA has also added CVE-2025-55182 to the Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to apply patches by December 26, 2025, under Binding Operational Directive 22-01.

    Organizations using React Server Components or frameworks built on top of them are advised to apply updates immediately, rebuild and redeploy their applications, and review logs for signs of PowerShell or shell command execution.


    Break down IAM silos like Bitpanda, KnowBe4, and PathAI

    Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

    This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what “good” IAM looks like, and a simple checklist for building a scalable strategy.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleNew wave of VPN login attempts targets Palo Alto GlobalProtect portals
    Next Article AI ‘creators’ might just crash the influencer economy
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    February 4, 2026

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    February 4, 2026

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    February 4, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025651 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025245 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025145 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 4, 2026

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling ProsIf you’re a Peloton…

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    We Retested Every Meal Kit Service. This Underdog Is Our New Favorite in 2026

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    9 Ways You’re Using Your Exercise Bike Wrong, According to Cycling Pros

    February 4, 20260 Views

    I Switched to a Smart Induction Stove. Here’s Why I’m Never Going Back

    February 4, 20260 Views

    Xbox Cloud Gaming Ad-Supported Tier: When Does It Start, How Much Will It Cost and More

    February 4, 20260 Views
    Most Popular

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.