Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Unpatched Edimax Camera Flaw Exploited Since at Least May 2024

A recently disclosed Edimax zero-day vulnerability has been exploited in the wild by Mirai botnets for nearly a year.

Edimax CVE-2025-1316 exploited by botnets

A recently disclosed zero-day affecting Edimax devices has been exploited in the wild since at least May 2024, according to CDN and cybersecurity solutions provider Akamai.

The vulnerability, identified as CVE-2025-1316, has been confirmed to impact Edimax IC-7100 IP cameras, but Akamai believes other Edimax IoT products may be impacted as well. 

Its existence came to light on March 4, when CISA published an advisory suggesting active exploitation. Akamai confirmed for SecurityWeek a few days later that CVE-2025-1316 has indeed been exploited in the wild, by multiple Mirai-based botnets.

The company, which has now released additional information on its findings, said it reported the vulnerability to Edimax in October 2024, but the vendor failed to take action. 

Only after the flaw’s in-the-wild exploitation was reported by SecurityWeek, Edimax, a Taiwan-based networking solutions provider, issued a statement saying that the vulnerability impacts devices discontinued more than a decade ago and it cannot be patched “due to the unavailability of the development environment and source code”.

Akamai’s analysis showed that its honeypots logged the first signs of exploitation in May 2024. These exploitation attempts stopped for a few months, but spiked again in September 2024, as well as in January and February 2025. 

However, exploitation may have started even sooner considering that — as the security firm reported — a PoC exploit for CVE-2025-1316 has been available since June 2023. 

Akamai’s honeypots have logged exploitation attempts from two Mirai-based botnets. Once they successfully access a device and exploit the vulnerability, the attackers execute commands to download and execute the main Mirai payload. 

Advertisement. Scroll to continue reading.

Exploitation of CVE-2025-1316 requires authentication, but Akamai noticed that threat actors have been completing this requirement by accessing targeted devices with known default credentials.

Akamai pointed out that one of these botnets has also exploited CVE-2024-7214, an unpatched Totolink device vulnerability that came to light in the summer of 2024. There do not appear to be any previous reports confirming exploitation of this vulnerability, but Totolink product flaws are known to have been targeted by Mirai-based botnets

“One of the most effective ways for cybercriminals to start assembling a botnet is to target poorly secured and outdated firmware on older devices,” Akamai said.

The company has made available indicators of compromise (IoC), as well as Yara and Snort rules. 

Related: BadBox Botnet Powered by 1 Million Android Devices Disrupted

Related: Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes

Related: New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

SplxAI, a startup focused on securing AI agents, has announced new CISO Sandy Dunn.

Phillip Miller is joining tax preparation giant H&R Block as VP and CISO.

Linx Security has appointed Sarit Reiner Frumkes as Chief Technology Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.