Hackers abused React Native CLI flaw to deploy Rust malware before public disclosure
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。好的,首先我得仔细阅读一下这篇文章。 文章主要讲的是黑客利用React Native CLI的一个漏洞CVE-2025-11953,在公开披露之前就已经部署了Rust恶意软件。这个漏洞允许攻击者通过发送POST请求来执行任意程序,特别是在Windows上可以运行带有完全控制参数的shell命令。VulnCheck的研究人员在公开披露前几周就观察到了实际攻击,并且攻击者持续使用这个漏洞,甚至在一个月后还在继续。 文章还提到攻击者使用了多阶段的PowerShell加载器,禁用了微软的Defender保护,通过raw TCP获取有效载荷,并执行下载的二进制文件。恶意软件是一个UPX压缩的Rustpayload,带有基本的反分析功能。VulnCheck警告说,由于缺乏公众关注和低EPSS评分,防御者可能没有准备好应对这种攻击。 好的,现在我要把这些信息浓缩到100字以内。重点包括:React Native CLI漏洞CVE-2025-11953被黑客利用,在公开前部署Rust恶意软件;该漏洞允许远程命令执行;研究人员在几周前就发现了实际攻击;攻击者持续使用该漏洞进行多阶段攻击;恶意软件具有反分析功能;防御者可能准备不足。 所以总结起来应该是:黑客利用React Native CLI漏洞CVE-2025-11953,在公开前部署Rust恶意软件。该漏洞允许远程命令执行和shell注入。研究人员发现实际攻击持续数周,显示攻击者在操作中使用该漏洞。恶意软件具有反分析功能。由于缺乏公众关注和低EPSS评分,防御者可能准备不足。 </think> 黑客利用React Native CLI漏洞CVE-2025-11953,在公开披露前部署Rust恶意软件。该漏洞允许远程命令执行和shell注入。研究人员发现实际攻击持续数周,显示攻击者在操作中使用该漏洞。恶意软件具有反分析功能。由于缺乏公众关注和低EPSS评分,防御者可能准备不足。 2026-2-3 15:41:57 Author: securityaffairs.com(查看原文) 阅读量:1 收藏

Hackers abused React Native CLI flaw to deploy Rust malware before public disclosure

Pierluigi Paganini February 03, 2026

Hackers exploit a critical React Native CLI flaw (CVE-2025-11953) to run remote commands and drop stealthy Rust malware, weeks before public disclosure.

Attackers are actively exploiting a critical flaw in the React Native CLI Metro server, tracked as CVE-2025-11953. The React Native CLI’s Metro dev server binds to external interfaces by default and exposes a command injection flaw. Unauthenticated attackers can send POST requests to execute arbitrary programs, and on Windows can also run shell commands with fully controlled arguments.

“The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables.” reads the advisory. “On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments.”

Metro is the JavaScript bundler and dev server used by React Native. By default it can expose an endpoint that lets unauthenticated attackers run OS commands on Windows.

VulnCheck researchers observed consistent, real-world attacks weeks before broad disclosure.

VulnCheck spotted real-world exploitation of CVE-2025-11953 (Metro4Shell) on December 21, 2025, and again in January, showing attackers kept using it. Despite this, the activity still lacks broad public attention and carries a low EPSS score. The gap is risky, since the flaw is easy to exploit and many exposed servers remain online.

“Now, more than a month after initial exploitation in the wild, that activity has yet to see broad public acknowledgment, and EPSS continues to assign a low exploitation probability of 0.00405.” reads the advisory published by VulnCheck. “This gap between observed exploitation and wider recognition matters, particularly for vulnerabilities that are easy to exploit and, as internet-wide search data shows, exposed on the public internet.”

VulnCheck found active, sustained exploitation of CVE-2025-11953, showing it was used operationally rather than for testing. Attackers delivered a multi-stage, base64-encoded PowerShell loader via cmd.exe, disabled Microsoft Defender protections, fetched payloads over raw TCP, and executed a downloaded binary. The malware was a UPX-packed Rust payload with basic anti-analysis features.

The experts noted that attacks reused the same infrastructure and techniques for weeks. VulnCheck warns the lack of public acknowledgment risks leaving defenders unprepared, as exploitation often begins well before official recognition.

Below is the Network Infrastructure involved in the attacks:

IndicatorObserved Role
65.109.182.231Exploitation source
223.6.249.141Exploitation source
134.209.69.155Exploitation source
8.218.43.248Payload host (Windows)
47.86.33.195Payload host (Windows and Linux)

“CVE-2025-11953 is not remarkable because it exists. It is remarkable because it reinforces a pattern defenders continue to relearn. Development infrastructure becomes production infrastructure the moment it is reachable, regardless of intent.” concludes the report.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, React Native CLI)




文章来源: https://securityaffairs.com/187587/hacking/hackers-abused-react-native-cli-flaw-to-deploy-rust-malware-before-public-disclosure.html
如有侵权请联系:admin#unsafe.sh