React2Shell Flaw Weaponized by ILOVEPOOP Attack Framework

React2Shell Flaw Weaponized by ILOVEPOOP Attack Framework
React2Shell Flaw Weaponized by ILOVEPOOP Attack Framework
A newly identified exploit toolkit dubbed ILOVEPOOP is actively weaponizing CVE-2025-55182, also known as “React2Shell,” to scan and target vulnerable Next.js and React Server Components (RSC) environments.

The findings come from the WXA Internet Abuse Signal Collective (WXA IASC), which correlated NetFlow telemetry, honeypot data, and enrichment datasets to map the infrastructure behind the campaign.

React2Shell was publicly disclosed on December 4, 2025. Within approximately 20 hours, WXA’s Niihama honeypot sensors observed active exploitation attempts.

Early traffic showed attackers using HTTP POST requests with a Next-Action: x header an indicator tied to React Server Actions. Payloads were sent as multipart/form-data with consistent content lengths, targeting paths such as:

  • /_next/flight
  • /_next/server-actions
  • /_react/flight
  • /_next/webpack-hmr
  • /login and /api/login

Over the first month after disclosure, more than 1,500 exploit attempts were recorded from over 70 unique IP addresses across multiple countries, demonstrating rapid global weaponization.

Centralized Infrastructure and Operator Toolkit

WXA telemetry highlights extreme infrastructure centralization around two Netherlands-hosted IP addresses:

  • 193.142.147[.]209
  • 87.121.84[.]24

Over a three-month observation window, these systems generated more than 22 million NetFlow records, interacting with millions of distinct source and destination IP addresses.

Independent GreyNoise reporting confirmed that these same IPs accounted for over half of the observed React2Shell exploitation traffic during the monitored period.

One of these hosts, 87.121.84[.]24, was directly tied to a cohesive exploit framework the ILOVEPOOP toolkit. This toolkit operates across nine scanner nodes hosted on providers in Poland, Germany, Bulgaria, and the Netherlands.

Across a 30-day window, the toolkit generated 672 exploit attempts, all sharing identical characteristics:

  • Next-Action: x header
  • Static X-Nextjs-Request-Id: poop1234
  • Per-request X-Nextjs-Html-Request-Id: ilovepoop_* identifiers
  • Payload sizes between 507 and 522 bytes
  • A six-path route sweep: /, /_next, /api, /_next/server, /app, /api/route
  • A rotating pool of 11 User-Agent strings

This uniform structure strongly suggests a single operator or tightly controlled toolkit rather than independent opportunistic scanners.

Multi-Protocol Exploitation and ICS Reconnaissance

In addition to HTTP-based exploitation, the campaign displayed unusual multi-protocol behavior. Honeypot telemetry captured one scanner attempting to deliver a React2Shell payload via a POP3 daemon.

This suggests either:

  • A protocol-agnostic exploit engine capable of reusing the same RSC primitive across services
  • Or a broad “spray-and-pray” delivery attempting to bypass port-based inspection

Separately, 87.121.84[.]24 conducted short bursts of DNP3 traffic an industrial control system (ICS) protocol indicating reconnaissance beyond web targets.

Within U.S.-sourced NetFlow interactions, approximately 65,000 high-confidence records were tied to identifiable organizations after enrichment. The largest exposure categories included:

  • SaaS and software platforms
  • Retail and eCommerce
  • Government agencies
  • Education and research
  • Healthcare

According to WhoisXMLAPI, importantly, 669 IPs observed communicating with the Netherlands exploit servers later conducted hostile actions against Niihama honeypots. These included:

  • 23,415 SMB attempts
  • 17,405 RDP attempts
  • 7,772 SSH attempts
  • More than 25,000 credential abuse attempts

In 91 cases, NetFlow telemetry detected interaction with exploit infrastructure a median of 45 days before direct honeypot attacks demonstrating strong early-warning value.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post React2Shell Flaw Weaponized by ILOVEPOOP Attack Framework appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading