The article discusses the exploitation of CVE-2024-3721 to deploy a Mirai bot on vulnerable DVR devices.CVE-2024-3721 enables execution of system commands on TBK DVRs via a specific POST request.The malicious POST request contains a shell script to download and execute an ARM32 binary.The Mirai bot variant targeting DVR devices includes features like RC4 encryption and anti-VM checks.RC4 key decryption is used to decrypt strings within the malware implant.The implant conducts checks to detect if it is running within a virtual machine environment.Infection statistics reveal that many infected DVR devices are located in countries like China, India, Egypt, and Ukraine.Over 50,000 vulnerable DVR devices have been identified online, indicating a significant attack surface.To mitigate such threats, updating vulnerable devices promptly and conducting factory resets for exposed devices is recommended.Kaspersky products detect the threat as HEUR:Backdoor.Linux.Mirai and HEUR:Backdoor.Linux.Gafgyt.