Attackers Use New Tool to Scan for React2Shell Exposure

Security researchers report that threat actors are now using a newly identified toolkit called “ILovePoop” to scan tens of millions of IP addresses for servers vulnerable to the critical React2Shell flaw (CVE-2025-55182), a high-severity remote code execution vulnerability found in React Server Components and frameworks like Next.js. Initially exploited in broad, noisy campaigns dropping cryptominers and botnets, activity has evolved into more deliberate reconnaissance against high-value targets including government, defense, finance and industrial organizations. The ongoing scanning underscores that the vulnerability remains actively pursued worldwide months after disclosure. (darkreading.com

https://www.darkreading.com/application-security/attackers-new-tool-scan-react2shell-exposure

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities