The Mirai botnet through 2024-08-19 mishandles simultaneous TCP connections to the CNC (command and control) server. Unauthenticated sessions remain open, causing resource consumption. For example, an attacker can send a recognized username (such as root), or can send arbitrary data.
- https://cypressthatkid.medium.com/remote-dos-exploit-found-in-mirai-botnet-source-code-27a1aad284f1
- https://pastebin.com/6tqHnCva
- https://youtu.be/aJkvSr85ML8
- https://github.com/nomi-sec/PoC-in-GitHub