Search Articles

Search Results: RCE

React2Shell Exposed: How a Single RCE in React Server Components Became a Global Threat Actor Playground

React2Shell Exposed: How a Single RCE in React Server Components Became a Global Threat Actor Playground

The CVE‑2025‑55182 “React2Shell” flaw in React Server Components unlocked unauthenticated remote code execution across thousands of Next.js sites. Within days, China‑nexus espionage groups, financial miners, and other threat actors deployed a suite of backdoors—MINOCAT, SNOWLIGHT, COMPOOD, HISONIC, and ANGRYREBEL.LINUX—turning the web framework into a launchpad for espionage and cryptocurrency mining.
Critical RCE Flaw in WatchGuard Firewalls Puts Enterprise Networks at Risk

Critical RCE Flaw in WatchGuard Firewalls Puts Enterprise Networks at Risk

WatchGuard has patched a severe remote code execution vulnerability (CVE-2025-9242) affecting Firebox firewalls using IKEv2 VPN configurations. Exploitation could let attackers hijack network appliances—even if vulnerable settings were previously deleted. The disclosure follows a pattern of firewall-targeting attacks by ransomware groups.
Critical RCE Vulnerability in WordPress Alone Theme Exploited in Over 120,000 Attacks

Critical RCE Vulnerability in WordPress Alone Theme Exploited in Over 120,000 Attacks

Threat actors are mass-exploiting a critical unauthenticated file upload flaw in WordPress's 'Alone' theme to execute remote code and hijack websites. Wordfence has blocked 120,000+ attacks, noting exploitation began before public disclosure. Nonprofits using this popular theme must update immediately to prevent complete site compromise.
Exploit Published for Critical Cisco ISE Vulnerability Amid Active Attacks

Exploit Published for Critical Cisco ISE Vulnerability Amid Active Attacks

Security researcher Bobby Gould has released a complete exploit chain for CVE-2025-20281, a critical unauthenticated RCE vulnerability in Cisco ISE actively exploited in the wild. The demonstration includes container escape techniques, escalating threats for unpatched networks managing identity and access controls.