Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
    Cybersecurity

    Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

    adminBy adminFebruary 4, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananFeb 03, 2026Open Source / Vulnerability

    Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular “@react-native-community/cli” npm package.

    Cybersecurity company VulnCheck said it first observed exploitation of CVE-2025-11953 (aka Metro4Shell) on December 21, 2025. With a CVSS score of 9.8, the vulnerability allows remote unauthenticated attackers to execute arbitrary operating system commands on the underlying host. Details of the flaw were first documented by JFrog in November 2025.

    Despite more than a month after initial exploitation in the wild, the “activity has yet to see broad public acknowledgment,” it added.

    In the attack detected against its honeypot network, the threat actors have weaponized the flaw to deliver a Base64-encoded PowerShell script that, once parsed, is configured to perform a series of actions, including Microsoft Defender Antivirus exclusions for the current working directory and the temporary folder (“C:\Users\\AppData\Local\Temp”).

    The PowerShell script also establishes a raw TCP connection to an attacker-controlled host and port (“8.218.43[.]248:60124”) and sends a request to retrieve data, write it to a file in the temporary directory, and execute it. The downloaded binary is based in Rust, and features anti-analysis checks to hinder static inspection.

    The attacks have been found to originate from the following IP addresses –

    • 5.109.182[.]231
    • 223.6.249[.]141
    • 134.209.69[.]155

    Describing the activity as neither experimental nor exploratory, VulnCheck said the delivered payloads were “consistent across multiple weeks of exploitation, indicating operational use rather than vulnerability probing or proof-of-concept testing.”

    “CVE-2025-11953 is not remarkable because it exists. It is remarkable because it reinforces a pattern defenders continue to relearn. Development infrastructure becomes production infrastructure the moment it is reachable, regardless of intent.”

    CLI exploit Flaw hackers Metro4Shell Native npm Package RCE React
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhat Are Backlinks in SEO & How Do I Get Them?
    Next Article Disney+ (Android TV) 26.0.2+rc1-2026.01.29 APK Download by Disney
    admin
    • Website

    Related Posts

    30 Alleged Members of ‘The Com’ Arrested in Project Compass

    March 3, 2026

    Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

    March 3, 2026

    Meta AI in WhatsApp organizes chats and reopens privacy issues

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google AI Generated Landing Page Patent Is Limited To Shopping & Ads

    March 3, 2026

    6 massive sci-fi and fantasy shows you need to watch in March

    March 3, 2026

    30 Alleged Members of ‘The Com’ Arrested in Project Compass

    March 3, 2026

    Samsung Sticker Center 2.7.03.34 by Samsung Electronics Co., Ltd.

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (567)
    • Privacy & Online Earning (78)
    • SEO & Digital Marketing (355)
    • Tech Tools & Mobile / Apps (704)
    • WiFi / Internet & Networking (102)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google AI Generated Landing Page Patent Is Limited To Shopping & Ads

    March 3, 2026

    6 massive sci-fi and fantasy shows you need to watch in March

    March 3, 2026

    30 Alleged Members of ‘The Com’ Arrested in Project Compass

    March 3, 2026
    Most Popular
    • Google AI Generated Landing Page Patent Is Limited To Shopping & Ads
    • 6 massive sci-fi and fantasy shows you need to watch in March
    • 30 Alleged Members of ‘The Com’ Arrested in Project Compass
    • Samsung Sticker Center 2.7.03.34 by Samsung Electronics Co., Ltd.
    • Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome
    • EFF to Court: Don’t Make Embedding Illegal
    • Google uses both schema.org markup and og:image meta tag for thumbnails in Google Search and Discover
    • 5 phones that are better than the Google Pixel 10a
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.