Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Actively Exploiting Critical NGIN NGINX Vulnerability
May 18, 2026
Critical n8n Flaws Expose Automation Nodes to Vulnerabilities Full
May 18, 2026
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Home/Threats/ILOVEPOOP Toolkit Exploiting React2Shell Vulnerability to Deploy
Threats

ILOVEPOOP Toolkit Exploiting React2Shell Vulnerability to Deploy

A critical vulnerability, dubbed “React2Shell” (CVE-2025-55182), has emerged, significantly impacting the cybersecurity sector. This flaw targets Next.js and React Server Components....

Emy Elsamnoudy
Emy Elsamnoudy
February 10, 2026 2 Min Read
5 0

A critical vulnerability, dubbed “React2Shell” (CVE-2025-55182), has emerged, significantly impacting the cybersecurity sector. This flaw targets Next.js and React Server Components.

Following its public disclosure on December 4, 2025, threat actors mobilized with alarming speed, launching exploitation attempts against internet-facing systems within just 20 hours.

The flaw allows unauthenticated attackers to execute arbitrary code on vulnerable servers, making it a high-priority threat for enterprises globally.

Attacks typically manifest as malicious HTTP POST requests targeting specific server routes such as /_next/server and /_next/flight.

By manipulating the serialization process of server components, intruders can inject unauthorized commands directly into the application’s runtime.

The initial waves of this campaign were characterized by high-volume scanning, designed to identify and compromise exposed infrastructure before defenders could apply necessary patches.

WhoisXMLAPI analysts identified the “ILOVEPOOP” toolkit as the driving force behind a significant portion of this hostile activity.

This sophisticated yet crudely named framework operates through a centralized infrastructure, primarily anchored by two high-traffic servers hosted in the Netherlands.

Telemetry indicates these nodes have interacted with millions of global endpoints, signaling a massive effort to map and exploit vulnerable networks across sectors like SaaS, retail, and government.

Inside the ILOVEPOOP Toolkit’s Mechanics

The toolkit distinguishes itself through a unique and consistent attack signature that simplifies detection for vigilant defenders.

It utilizes a cluster of nine distinct scanner nodes that rotate their operations to maintain persistence and evade static blocklists.

A hallmark of this toolkit is the inclusion of specific, non-standard HTTP headers in every exploit attempt, most notably X-Nextjs-Request-Id: poop1234 and Next-Action: x.

These markers serve as a digital fingerprint, tying thousands of disparate attacks back to a single operator or group.

Furthermore, the toolkit employs a rigorous scanning methodology, systematically probing six specific Next.js paths to test for susceptibility.

It often begins with generic reconnaissance against login pages before escalating to complex React Server Actions payloads involving prototype pollution.

The infrastructure is highly centralized, with the two primary Netherlands IPs (193.142.147[.]209 and 87.121.84[.]24) acting as the command hubs.

Additionally, the toolkit has demonstrated unusual versatility, with observed attempts to deliver React2Shell payloads via POP3 protocols, likely to bypass standard web filters.

However, blocking these core nodes and filtering for the “ilovepoop” header patterns remains the most effective method to neutralize the immediate threat.

Security teams should urgently patch affected Next.js installations and configure Web Application Firewalls (WAF) to reject requests containing the identified malicious headers.

Additionally, blocking traffic from the known Netherlands-based exploit servers is strongly advised to disrupt the toolkit’s primary communication channels.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVECybersecurityExploitPatchSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Hackers Use 7-Zip Downloads to Turn PCs into Weaponizing Your

Next Post

TeamPCP Industrializes Cloud Misconfigurations for Cyber

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Avada Builder Flaws Affect 1 Million WordPress Sites with
May 18, 2026
Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922
May 18, 2026
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us