Nexcorium Botnet Campaign Weaponizes DVR Command Injection to Expand Mirai's IoT Stranglehold
FortiGuard Labs confirms active exploitation of CVE-2024-3721 in TBK DVR devices, deploying a Mirai-based botnet variant targeting vulnerable network-connected surveillance hardware.
This analysis is based on research published by Infosecurity Magazine. CypherByte adds analysis, context, and security team recommendations.
Source credit: Original reporting by Infosecurity Magazine. CypherByte analysis builds upon FortiGuard Labs research into the Nexcorium campaign targeting TBK DVR infrastructure.
Executive Summary
A newly identified threat campaign tracked under the name Nexcorium is actively exploiting CVE-2024-3721, a command injection vulnerability present in TBK DVR (Digital Video Recorder) devices, to propagate a Mirai-based botnet across vulnerable IoT infrastructure. Researchers at FortiGuard Labs confirmed the campaign is in active deployment, leveraging unauthenticated remote command injection to gain foothold on internet-exposed surveillance hardware at scale. Security operations teams managing distributed physical security infrastructure, managed service providers overseeing SMB networks, and enterprise security architects responsible for OT/IoT asset inventories should treat this campaign as an immediate operational concern — not a future threat to be triaged.
The broader significance of Nexcorium extends well beyond the affected DVR product line. This campaign is a textbook demonstration of how aging IoT hardware with inconsistent patch cadences becomes low-cost, high-yield attack surface for botnet operators. The Mirai codebase — now nearly a decade old — continues to evolve and find new life in campaigns precisely because the underlying problem it exploits has never been solved: millions of internet-connected embedded devices running outdated firmware with little to no active monitoring. For security teams, this is not a novel threat; it is a recurring indictment of enterprise IoT hygiene.
Technical Analysis
CVE-2024-3721 is a command injection vulnerability affecting TBK DVR devices, a category of networked surveillance hardware widely deployed in retail, hospitality, transportation, and small-to-medium enterprise environments. The vulnerability resides in the device's web-based management interface and permits an unauthenticated attacker to inject and execute arbitrary operating system commands by submitting malformed input through a specific HTTP request parameter. No valid credentials are required to trigger exploitation — the attack surface is exposed to anyone who can reach the management interface over the network.
The exploitation chain observed in the Nexcorium campaign follows a well-established Mirai playbook. Phase one involves automated scanning infrastructure probing for internet-exposed TBK DVR management ports — typically over standard HTTP on port 80 or 8080. Once a vulnerable device is identified, phase two delivers an initial HTTP request crafted to exploit CVE-2024-3721, injecting a shell command sequence that initiates an outbound connection to an attacker-controlled staging server. Phase three executes a dropper — commonly a shell script — which downloads the architecture-appropriate Mirai binary. TBK DVR devices commonly run on MIPS or ARM-based processors, and Mirai operators have historically distributed multi-architecture builds to maximize infection breadth.
Once installed, the Mirai variant establishes persistence through standard embedded-Linux mechanisms, terminates competing bot processes — a signature Mirai behavior to protect territorial control of infected nodes — and beacons to command-and-control infrastructure. The infected device then awaits tasking, typically DDoS flood instructions targeting downstream victims. The Nexcorium variant exhibits behavioral characteristics consistent with evolved Mirai forks that have refined their scanning aggressiveness and incorporated hardcoded credential lists targeting a broader range of IoT device classes beyond the initial infection vector, suggesting operators intend to use TBK DVR compromise as a pivot for lateral IoT network expansion.
Impact Assessment
Affected systems are TBK DVR devices running firmware versions vulnerable to CVE-2024-3721. TBK DVR hardware is sold both under the TBK brand and under numerous OEM white-label configurations — a critical complication that significantly expands the realistic affected device population beyond what model-specific advisories might suggest. Organizations that purchased DVR systems under third-party branding may be running identical vulnerable firmware without awareness of the underlying platform identity or applicability of published advisories.
The real-world consequences operate on two levels. For device owners, compromise means their surveillance infrastructure — systems explicitly designed to provide physical security assurance — has been weaponized against third parties. Infected devices may exhibit degraded performance, unexpected network traffic spikes, and potential exposure of recorded video feeds if the botnet operator chooses to leverage access beyond pure DDoS capability. For downstream targets of Nexcorium-directed DDoS campaigns, the consequence is volumetric attack traffic generated from a distributed botnet with a legitimate-looking source IP diversity profile that complicates basic IP-block mitigation strategies.
The patch and remediation landscape for TBK DVR devices is unfavorable. Embedded DVR hardware in this market segment is frequently purchased as capital equipment with multi-year deployment assumptions, rarely receives proactive firmware updates from end users, and in many cases is administered by non-security personnel — facility managers, IT generalists, or third-party installers — who lack visibility into vulnerability disclosure channels. This structural dynamic means a meaningful percentage of vulnerable devices will remain exposed for months to years following initial disclosure.
CypherByte's Perspective
The Nexcorium campaign is a precise mirror of a pattern CypherByte has tracked across multiple IoT threat campaigns over the past three years: the Mirai codebase is not dying — it is diversifying. Each new variant represents a threat actor's calculated decision that the barrier to launching an IoT botnet campaign has dropped below the threshold that makes it economically rational to pursue. CVE-2024-3721 is not a sophisticated zero-day requiring advanced exploitation tradecraft. It is a command injection flaw in an embedded web interface — a vulnerability class that has been well-understood for over two decades. The fact that it exists in production hardware actively sold and deployed in 2024 is a product security failure, not a sophisticated attack.
From a mobile and IoT security perspective, this campaign reinforces a critical architectural truth: network segmentation is not optional for IoT deployments. DVR systems, building management controllers, smart cameras, and similar embedded devices should never share network segments with business-critical infrastructure, and their management interfaces should never be directly internet-reachable. The industry's continued failure to enforce this at the deployment level — not just in documentation — is what makes campaigns like Nexcorium not just possible but trivially scalable. Until IoT device vendors are held to meaningful security lifecycle standards and enterprise procurement includes mandatory security criteria for embedded hardware, FortiGuard Labs and teams like ours will continue publishing variations of this same analysis with only the CVE number changed.
Indicators and Detection
Security teams can pursue detection of Nexcorium activity across several layers. Network-level indicators include anomalous outbound HTTP or raw TCP connections from DVR device IP addresses to external hosts — particularly to hosting infrastructure in ASNs commonly associated with bulletproof hosting. Mirai bots generate characteristic scanning traffic: high-volume, high-rate TCP SYN packets across port ranges including 23, 2323, 7547, 80, and 8080. NetFlow or equivalent traffic telemetry from DVR VLANs showing unexpected outbound connection volume should be treated as a high-confidence compromise indicator.
Host-level indicators on accessible Linux-based DVR systems include unexpected processes consuming CPU resources, the presence of unfamiliar binary files in /tmp or world-writable directories, and modification of /etc/crontab or init scripts for persistence. Mirai variants characteristically attempt to bind listening ports in ranges associated with their C2 protocol and will kill competing bot processes, which may generate observable process activity if device logging is enabled.
Recommendations
1. Immediate asset inventory audit. Security teams should enumerate all DVR systems on managed networks, identify TBK-manufactured devices or OEM equivalents, and determine firmware versions. Given OEM complexity, cross-reference device management interface fingerprints against known TBK UI characteristics if vendor documentation is unavailable.
2. Firewall and exposure remediation. Any TBK DVR management interface currently reachable from the public internet should be blocked at the perimeter immediately, prior to patching. There is no operational justification for exposing DVR management interfaces to the open internet. Implement network access control restricting management interface access to dedicated administration VLANs or jump hosts.
3. Firmware update verification. Contact TBK or your OEM vendor to obtain the latest available firmware addressing CVE-2024-3721 and apply updates following your change management process. If no patch is currently available for your specific device model, treat the device as compromised-risk and implement compensating controls including network isolation and traffic monitoring.
4. IoT network segmentation enforcement. Use this campaign as a forcing function to review and enforce IoT network segmentation policy across your environment. DVR systems, IP cameras, and building management devices should reside on isolated VLANs with default-deny egress policies allowing only the specific outbound connections required for legitimate function.
5. Traffic monitoring deployment. Implement NetFlow collection and anomaly detection on IoT network segments if not already in place. Establish behavioral baselines for DVR device traffic and configure alerting for deviations including unexpected outbound connection volume, connections to novel external IPs, or scanning-pattern traffic signatures.
6. Procurement policy review. Organizations acquiring embedded hardware should establish minimum security requirements for vendor firmware update commitments, vulnerability disclosure processes, and lifecycle support periods. Devices without documented security support commitments represent calculable long-term risk that should factor into procurement decisions.
CypherByte will continue monitoring Nexcorium campaign evolution and will publish updated indicators as new infrastructure is identified. Original reporting by Infosecurity Magazine; technical campaign data sourced from FortiGuard Labs.
Get full access to all research analyses, deep-dive writeups, and premium threat intelligence.