Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

682+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet
NEWS

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors are deploying the Nexcorium Mirai botnet variant by exploiting CVE-2024-3721 in TBK DVR devices and targeting end-of-life TP-Link Wi-Fi routers. Fortinet FortiGuard Labs and Palo Alto Networks Unit 42 documented the active campaign targeting exposed IoT infrastructure.

Dylan H.

News Desk

April 18, 2026
5 min read

Overview

Security researchers at Fortinet FortiGuard Labs and Palo Alto Networks Unit 42 have documented active exploitation campaigns deploying a new Mirai botnet variant dubbed Nexcorium. The campaign targets TBK DVR (Digital Video Recorder) devices by exploiting CVE-2024-3721, as well as end-of-life (EoL) TP-Link Wi-Fi routers vulnerable to known unpatched flaws. Compromised devices are absorbed into a DDoS botnet.

Nexcorium: A New Mirai Variant

Nexcorium is a freshly identified variant of the long-running Mirai malware family, first discovered in 2016 targeting IoT devices for DDoS amplification. Like its predecessors, Nexcorium:

  • Scans the internet for devices with known vulnerabilities or weak/default credentials
  • Exploits discovered weaknesses to gain remote access and deploy the malware payload
  • Enrolls the compromised device into a command-and-control (C2) botnet infrastructure
  • Receives instructions to participate in distributed denial-of-service attacks against attacker-specified targets

Nexcorium's distinguishing features compared to baseline Mirai include updated exploit modules targeting 2024–2026 CVEs, improved evasion of basic honeypot detection, and support for additional DDoS attack vectors.

CVE-2024-3721: TBK DVR Exploitation

CVE-2024-3721 is a critical vulnerability in TBK Vision DVR devices — a brand of digital video recorders widely deployed in commercial and residential surveillance systems worldwide.

AttributeValue
CVE IDCVE-2024-3721
Affected DeviceTBK Vision DVR
Attack VectorNetwork (unauthenticated)
ImpactRemote code execution / shell access
Exploitation StatusActively exploited

The flaw allows an unauthenticated remote attacker to execute arbitrary commands on the affected DVR. Exploitation is straightforward: attackers send a crafted HTTP request to the device's web management interface, triggering command execution and enabling the Nexcorium payload to be downloaded and executed.

TBK DVRs are frequently internet-exposed, have long device lifecycles (no automatic updates), and are often configured with default credentials — making them persistent targets for IoT botnets.

TP-Link End-of-Life Router Targeting

In parallel with the TBK DVR campaign, Nexcorium also targets TP-Link Wi-Fi routers that have reached end-of-life and no longer receive security patches. These devices include several home and SMB router models whose firmware vulnerabilities are publicly known but cannot be officially patched.

The exploitation of EoL devices is a persistent IoT security challenge: organizations and consumers continue operating devices past vendor support lifespans, leaving them permanently vulnerable to botnet recruitment.

Active Exploitation Evidence

Fortinet FortiGuard Labs documented:

  • Ongoing scanning activity targeting TBK DVR web interfaces on TCP/80 and TCP/8080
  • Payload delivery consistent with Nexcorium binary signatures
  • C2 infrastructure operating across multiple geographic regions
  • DDoS attack traffic originating from botnet nodes after successful recruitment

Palo Alto Networks Unit 42 corroborated the campaign with independent telemetry showing widespread scanning for CVE-2024-3721 across their sensor network.

Affected Devices and Remediation

TBK DVR Devices

ActionDetails
Check for patchesVisit the TBK Vision website for available firmware updates
Disable remote accessRestrict web interface access to trusted IP addresses only
Change default credentialsReplace factory default admin credentials immediately
Network segmentationPlace DVRs on an isolated VLAN — no direct internet exposure
Consider replacementDevices no longer receiving patches should be replaced with actively supported models

TP-Link EoL Routers

ActionDetails
Replace the deviceNo security patches will be issued — replacement is the only long-term solution
Interim: disable remote managementTurn off WAN-facing admin interfaces
Firewall upstreamBlock inbound management traffic at the ISP/modem level
Monitor for anomaliesUnexpected outbound traffic, high CPU, or unknown connections may indicate compromise

Detecting Nexcorium Infection

Signs that a device may already be compromised by Nexcorium or a Mirai variant:

  • Unusually high CPU/memory usage on the device
  • Unexpected outbound connections to unknown IP addresses
  • Slow or unresponsive web management interface
  • Device reboots without user action
  • Participation in DDoS events against third parties (reported by upstream ISP)

Recovery: Rebooting the device clears the in-memory Mirai infection (Mirai does not typically achieve persistence beyond reboot). However, if the underlying vulnerability is not patched or remote access is not restricted, re-infection will occur rapidly.

Why IoT Botnets Persist

The continued effectiveness of Mirai-family botnets reflects several structural challenges in IoT security:

  1. No automatic patching — most IoT devices require manual firmware updates that consumers never apply
  2. Long device lifespans — hardware is kept far beyond vendor support windows
  3. Default credentials — factory defaults remain unchanged in millions of deployed units
  4. Internet exposure — devices intended for local use are frequently exposed directly to the internet via UPnP or manual port forwarding
  5. No endpoint security — IoT devices lack EDR, AV, or behavioral monitoring capabilities

Until IoT device manufacturers and consumers address these structural issues, Mirai-family botnets will remain a persistent and growing threat to internet infrastructure.

References

  • The Hacker News — Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs
  • Fortinet FortiGuard Labs — Nexcorium IoT Campaign
  • Palo Alto Networks Unit 42 Research
  • NVD — CVE-2024-3721
  • CISA — Mirai Botnet Guidance
#Mirai#Nexcorium#CVE-2024-3721#TBK DVR#TP-Link#IoT Security#DDoS#Botnet#Fortinet#The Hacker News

Related Articles

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

This week's ThreatsDay Bulletin from The Hacker News covers 20 active threats including a hybrid P2P DDoS botnet, a 13-year-old Apache ActiveMQ RCE flaw...

4 min read

Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More

This week's biggest cybersecurity stories: a North Korean supply chain attack hit the Axios npm package, a new Chrome zero-day under active exploitation,...

5 min read

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

A joint operation by the US Department of Justice, Canada, and Germany has dismantled the infrastructure behind four highly disruptive IoT botnets that...

4 min read
Back to all News