Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Recent Langflow Vulnerability Exploited by Flodrix Botnet

A critical Langflow vulnerability tracked as CVE-2025-3248 has been exploited to ensnare devices in the Flodrix botnet.

Badbox 2 botnet lawsuit by Google

Threat actors have been exploiting a recently patched Langflow vulnerability to ensnare devices in the Flodrix botnet, Trend Micro warned on Tuesday.

The flaw, tracked as CVE-2025-3248, started making headlines in early May, after the cybersecurity agency CISA added it to its Known Exploited Vulnerabilities (KEV) catalog.

The existence of the vulnerability, which can be exploited by a remote and unauthenticated attacker for arbitrary code execution, came to light in early April, after a patch was rolled out with the release of Langflow 1.3.0. 

Technical details and proof-of-concept (PoC) exploits started emerging roughly one week later. 

Langflow is a popular low-code development platform designed for the creation and deployment of AI agents and workflows. It has more than 70,000 stars on GitHub.

When CISA added CVE-2025-3248 to its KEV catalog, no information was available on the attacks exploiting the vulnerability. 

Trend Micro has now revealed that the security hole has been exploited in Flodrix botnet attacks. Specifically, attackers scanned the internet for vulnerable Langflow instances and then leveraged one of the publicly available PoC exploits to achieve shell access on the system and run various commands for reconnaissance purposes.

The threat actor then downloaded and executed the Flodrix malware on the compromised systems. Once up and running, the malware establishes a connection to its C&C server and waits for commands from its operator. The Flodrix botnet is mainly used to conduct DDoS attacks. 

Advertisement. Scroll to continue reading.

According to Trend Micro, the malware used in these attacks is an evolution of the LeetHozer malware analyzed by Chinese security firm Qihoo 360 back in 2020. 

While there are several similarities to LeetHozer, there are also some differences, including different response headers, multiple configuration options, new DDoS attack types, and additional layers of obfuscation.

“This variant employs multiple stealth techniques, including self-deletion and artifact removal, to minimize forensic traces and hinder detection. It also uses string obfuscation to conceal command-and-control (C&C) server addresses and other critical indicators, complicating analysis efforts,” Trend Micro said.

Threat intelligence firm GreyNoise has seen more than 370 IP addresses attempting to exploit CVE-2025-3248 over the past month, with the most recent attempts seen by the company on June 12. 

At the time of writing, the Censys search engine shows more than 1,600 internet-exposed Langflow instances, but it’s unclear how many of them are actually vulnerable to attacks.

Related: Mirai Botnets Exploiting Wazuh Security Platform Vulnerability

Related: DanaBot Botnet Disrupted, 16 Suspects Charged

Related: US Announces Botnet Takedown, Charges Against Russian Administrators

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Coro, a provider of cybersecurity solutions for SMBs, has appointed Joe Sykora as CEO.

SonicWall has hired Rajnish Mishra as Senior Vice President and Chief Development Officer.

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.