This article was co-authored by Hui Wang, LIU Ya, Rootkiter and Yegenshen.
In our previous articles I and II of this series, we mentioned that since the expose of the GPON vulnerabilities (CVE-2018-10561, CVE-2018-10562), there have been at least five botnet families actively exploiting this vulnerability to build their bot