Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»React2Shell Under Active Exploitation by China-Nexus Hackers
News

React2Shell Under Active Exploitation by China-Nexus Hackers

Team-CWDBy Team-CWDDecember 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Just days after the disclosure of the React2Shell critical vulnerability, tracked as CVE-2025-55182, threat actors are actively exploiting the flaw in the wild.

The vulnerability carries a CVSS v3.1 score of 10, the highest possible severity rating.

Amazon Web Services (AWS) has confirmed that threat groups including Earth Lamia and Jackpot Panda, both linked to Chinese state interests, are among those launching exploitation attempts.

Earth Lamia is known for exploiting web application vulnerabilities to target organizations across Latin America, the Middle East and Southeast Asia.

The group has historically targeted sectors across financial services, logistics, retail, IT companies, universities, and government organizations.

Jackpot Panda is primarily targets entities in East and Southeast Asia.

Over Two Million Instances Potentially Affected by React2Shell

Several functional proof-of-concept (PoC) exploits now exist for CVE-2025-55182.

The rapid weaponization of PoCs underscores the fact that sophisticated threat actors waste no time turning vulnerabilities into operational exploits.

Meanwhile, the Shadowserver Foundation has identified over 77,000 vulnerable IPs following a scan of exposed HTTP services across a wide variety of exposed edge devices and other applications.

Censys observed just over 2.15 million instances of internet-facing services that may be affected by this vulnerability. This includes exposed web services using React Server Components and exposed instances of frameworks such as Next.js, Waku, React Router and RedwoodSDK. 

The bug is a pre-authentication remote code execution (RCE) vulnerability which exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0. React issued a security advisory with the relevant patches and updates on December 3.

Any internet‑accessible server running the affected React Server Components code should be assumed vulnerable until updated as a precaution, security researchers have warned.

Alongside the impact from potential malicious exploitation, remediation of the flaw could also have adverse consequences. For instance, on December 5, 2025, significant failures affecting Cloudflare’s network occurred. The internet network provider has since confirmed that the incident was triggered by changes being made to body parsing logic while attempting to detect and mitigate the React2Shell vulnerability.

PoCs Not All Created Equally

The AWS investigation pointed out that threat actors use both automated scanning tools and individual PoC exploits.

Some of these malicious actors are monitoring for new CVE disclosures and rapidly integrate public exploits into their scanning infrastructure.

However, AWS observed that many threat actors are attempting to use public PoCs that don’t work in real-world scenarios. 

Earlier, security firm JFrog also warned that there are fake PoCs available on GitHub and noted that some of these types of projects often contain malicious code themselves.

Many of the public PoCs contain technical inaccuracies, according to AWS. However, threat actors are still attempting to use them.

AWS said the use of these PoCs shows that threat actors prioritize rapid operationalization over thorough testing, attempting to exploit targets with any available tool.

Using multiple PoCs to scan for vulnerable environments also gives threat actors a higher chance of identifying vulnerable configurations, even if the PoCs are non-functional.

The availability of the PoCs also allows less sophisticated actors to participate in exploitation campaigns.

Finally, AWS note that even failed exploitation attempts create significant noise in logs, potentially masking more sophisticated attacks.

The invalid PoCs can give developers a false sense of security when testing for React2Shell.

In a repository dedicated to React2Shell, Lachlan Davidson, the security researcher who discovered the vulnerability, wrote: “Many of these ‘PoCs’ have been referenced in publications, and even some vulnerability aggregators. We are concerned that these may lead to false negatives when evaluating if a service is vulnerable, or lead to unpreparedness if or when a genuine PoC surfaces.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNorth Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
Next Article Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How to help older family members avoid scams

October 31, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.