

The following table shows the structure if the UDP notification traffic:
KILLDETAIL|PID|PPID|SIGNAL|COMM|EXE|CWD|CMDLINE|SOCKET_COUNT | |
KILLDETAIL | Hardcoded value |
PID (Process ID) | Get from PID from /proc directory |
PPID (Parent Process ID) | Get from /proc/%d/stat file with %c %d options |
Signal (Action) | Hardcoded values. Possible values (2,3,4,5,8,9) |
COMM (Process Name) | Get from /proc/%d/comm file |
EXE (Process Executable Path) | Get from /proc/%d/exe file |
CWD (Current Working Directory) | Get from /proc/%d/cwd file |
CMDLINE (Command Line) | Get from /proc/%d/cmdline file |
Number of sockets | Get from /proc/%d/fd/%s file |
Table 6. UDP notification request anatomy
Proactive security with Trend Vision One™
Trend Vision One™ is the only AI-powered enterprise cybersecurity platform that centralizes cyber risk exposure management, security operations, and robust layered protection. This comprehensive approach helps you predict and prevent threats, accelerating proactive security outcomes across your entire digital estate.
Backed by decades of cybersecurity leadership and Trend Cybertron, the industry’s first proactive cybersecurity AI, it delivers proven results: a 92% reduction in ransomware risk and a 99% reduction in detection time. Security leaders can benchmark their posture and showcase continuous improvement to stakeholders.
Trend protections for CVE-2025-3248
The following protections have been available to Trend Micro customers:
Trend Vision One™ Network Security
- TippingPoint Intrusion Prevention Filters:
- 46063: TCP: Trojan.Linux.FlodrixBot.A Runtime Detection
- 46064: UDP: Trojan.Linux.FlodrixBot.A Runtime Detection
- 45744: HTTP: Langflow Code Injection Vulnerability
- Deep Discovery Inspector (DDI) Relevance Rule: 5411: CVE-2025-3248 – LANGFLOW RCE – HTTP (Request)
Trend Micro™ Threat Intelligence
To stay ahead of evolving threats, Trend customers can access Trend Vision One™ Threat Insights, which provides the latest insights from Trend Research on emerging threats and threat actors.
Trend Vision One Threat Insights
Emerging Threats: Critical Langflow Vulnerability [CVE-2025-3248] Actively Exploited to Deliver Flodrix Botnet
Hunting Queries
Trend Vision One Search App
Trend Vision One customers can use the Search App to match or hunt the malicious indicators mentioned in this blog post with data in their environment.
C&C connections of Flodrix Botnet
eventSubId:602 AND objectIp:(80.66.75.121 OR 45.61.137.226 OR 206.71.149.179 OR 188.166.68.21)
More hunting queries are available for Vision One customers with Threat Insights Entitlement enabled
Indicators of Compromise (IOCs)
You can find the IoCs for this blog here.