Wazuh servers targeted by Mirai botnets


Potential attackers could exploit a critical flaw to remotely execute code by uploading what researchers from Akamai called an “unsanitized dictionary.”

The Mirai botnet, initially discovered back in August 2016, continues to be a nightmare for system defenders.

The Akamai Security Intelligence and Response Team (SIRT) has identified two campaigns of Mirai botnet variants that exploited a critical remote code execution (RCE) vulnerability against Wazuh servers.

ADVERTISEMENT

Initially, the vulnerability was disclosed in February, and the Akamai SIRT first identified activity in March.

The flaw hasn’t been added to CISA’s Known Exploited Vulnerability (KEV) catalog despite being public for months.

jurgita Konstancija Gasaityte profile Marcus Walsh profile Izabelė Pukėnaitė
Be the first to know and get our latest stories on Google News

The flaw (CVE-2025-24016) was disclosed in Wazuh, a free and open-source platform for threat prevention, detection, and response.

The vulnerability affects Wazuh 4.4.0 through 4.9.0, and the patch was released in version 4.9.1.

By exploiting the vulnerability, a remote attacker with API access could execute arbitrary code using a malicious JSON file.

“In the Wazuh API, parameters in the DistributedAPI are serialized as JSON, then deserialized using as_Wazuh_object in the framework/wazuh/core/cluster/common.py file. This can be exploited by injecting an unsanitized dictionary into DAPI requests, which can lead to evaluation of arbitrary Python code,” Akamai said.

Or, as we understand it, attackers can “simply” trick systems into running malicious Python code.

ADVERTISEMENT

Researchers noted that the vulnerability only affects active Wazuh servers running outdated versions and urged users to update to Wazuh version 4.9.1 or later.