Mirai Botnet Exploiting Command Injection Vulnerabilities in GeoVision IoT Devices

The Akamai Security Intelligence and Response Team (SIRT) has detected active exploitation of command injection vulnerabilities CVE-2024-6047 and CVE-2024-11120 affecting discontinued GeoVision IoT devices.

The malicious activities first surfaced through Akamai’s global network of honeypots in April 2025.

This marks the first observed in-the-wild exploitation of these vulnerabilities since their initial disclosures in June and November 2024, respectively, and highlights the ongoing risks associated with unsupported hardware.

Exploit Details and Attack Chain

The attack targets the /DateSetting.cgi endpoint on affected GeoVision devices, specifically exploiting a lack of input sanitization in the szSrvIpAddr parameter.

Mirai Botnet
Hard-coded C2 IP address from the malware’s sym.resolve_cnc_addr() function

Remote, unauthenticated attackers are able to inject arbitrary system commands, enabling full device compromise without user interaction.

Investigation revealed that threat actors are leveraging the compromised endpoint to download and execute Mirai-based ARM malware, notably a variant referred to as “LZRD” (typically named boatnet.arm7).

Upon execution, this Mirai variant displays a distinctive console string, facilitating identification.

The malware incorporates a suite of built-in attack modules, consistent with established Mirai functionalities, including UDP flood, TCP ACK, SYN, and custom attack methods.

Notably, the malware’s codebase harbors a hard-coded command and control (C2) IP address-indicative of centrally orchestrated botnet operations.

Mirai Botnet
Banner message on C2 port on the botnet’s C2 server

Further analysis of the infrastructure connected to these C2 addresses revealed banner messages similar to “Infected Slurs,” previously associated with the TBOTNET botnet family.

This association suggests evolution and re-use of botnet infrastructure by adversaries, as legacy campaigns persist and adapt.

Threat Landscape: Multiple Vulnerabilities Targeted

Beyond the GeoVision vulnerabilities, the same botnet campaign has attempted to exploit a spectrum of known IoT flaws, including a Hadoop YARN bug, exploits in ZTE ZXV10 H108L routers (CVE-2018-10561), and the DigiEver vulnerability reported by Akamai in previous advisories.

The convergence of these exploits demonstrates the attacker’s strategy of leveraging a broad set of unpatched, obsolete devices to maximize botnet scale.

This campaign underscores the chronic risk posed by end-of-life IoT products that do not receive security updates.

GeoVision has confirmed the affected models are discontinued and will not be patched.

As a result, organizations are urged to decommission vulnerable devices and upgrade to supported hardware as the only effective mitigation strategy.

Where replacement is not immediately possible, network-level defenses and vigilant monitoring for the provided indicators of compromise are essential.

Akamai SIRT continues to monitor this threat and recommends defenders utilize the IOCs below for detection and response.

Indicators of Compromise (IOC)

TypeValue
C2 IP Addresses209.141.44.28
51.38.137.114
176.65.144.253
176.65.144.232
198.23.212.246
C2 Domainconnect.antiwifi.dev
Malware Sample SHA256f05247a2322e212513ee08b2e8513f4c764bde7b30831736dfc927097baf6714
11c0447f524d0fcb3be2cd0fbd23eb2cc2045f374b70c9c029708a9f2f4a4114
8df660bd1722a09c45fb213e591d1dab73f24d240c456865fe0e2dc85573d85e
ecc794a86dcc51b1f74d8b1eb9e7e0158381faadaf4cb4ee8febd4ba17fd2516
03b1506c474a6f62f2e2b73ba4995b14da70b27e6d0aaea92638197e94d937c3
0333c6ac43c6e977e9a1c5071194d3cf8aa01222194c6e7f2fd13e631d03522d
…(Full list available in Yara/Snort rules)
Exploited Endpoints/DateSetting.cgi
/cgi-bin/cgi_main.cgi

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here