Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Active Exploitation Detected in Gladinet and TrioFox Vulnerability
News

Active Exploitation Detected in Gladinet and TrioFox Vulnerability

Team-CWDBy Team-CWDOctober 19, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet CentreStack and TrioFox products.

The zero-day vulnerability, tracked as CVE-2025-11371 (CVSS score: 6.1), is an unauthenticated local file inclusion bug that allows unintended disclosure of system files. It impacts all versions of the software prior to and including 16.7.10368.56560.

Huntress said it first detected the activity on September 27, 2025, uncovering that three of its customers have been impacted so far.

It’s worth noting that both applications were previously affected by CVE-2025-30406 (CVSS score: 9.0), a case of hard-coded machine key that could allow a threat actor to perform remote code execution via a ViewState deserialization vulnerability. The vulnerability has since come under active exploitation.

CVE-2025-11371, per Huntress, “allowed a threat actor to retrieve the machine key from the application Web.config file to perform remote code execution via the aforementioned ViewState deserialization vulnerability.”

In one instance investigated by the company, the affected version was newer than 16.4.10315.56368 and not vulnerable to CVE-2025-30406, suggesting that attackers are exploiting the new flaw to extract the hard-coded machine key and use it to execute code remotely via the ViewState deserialization flaw.

In the interim, users are recommended to disable the “temp” handler within the Web.config file for UploadDownloadProxy located at “C:Program Files (x86)Gladinet Cloud EnterpriseUploadDownloadProxyWeb.config.”

“This will impact some functionality of the platform; however, it will ensure that this vulnerability cannot be exploited until it is patched,” Huntress researchers Bryan Masters, James Maclachlan, Jai Minton, and John Hammond said.

Huntress told The Hacker News that it has observed a “handful of incidents” that led to a confirmed compromise as a result of CVE-2025-11371. The activity has not been attributed to any threat actor, although the possibility that the two sets of attacks could be the work of the same group has not been ruled out.

“It’s unclear if these are the same threat actors, but I wouldn’t be surprised since they would have already been familiar with this particular piece of software and they could have found this new vulnerability with minimal effort,” Jamie Levy, director of adversary tactics at Huntress, said.

More Details of the Flaw Emerge

Gladinet, on October 14, 2025, released version 16.10.10408.56683 of CentreStack and Triofox, which includes a fix for CVE-2025-11371, making it crucial that users apply the latest fixes as soon as possible.

In an updated report, Huntress said it observed an “unusual GET request” to the unauthenticated “/storage/t.dn” endpoint that prompted the server to respond with a copy of the Web.config file from the “C:Program Files (x86)Gladinet Cloud EnterpriserootWeb.config” location. The entire HTTP request is as follows –

GET /storage/t.dn s=......Program+Files+(x86)Gladinet+Cloud+EnterpriserootWeb.config&sid=1

The request to the endpoint is handled by the “GladinetStorage.TempDownload” function located in a DLL named “GSUploadDownloadProxy.dll,” which is designed to retrieve files from the temp directory for authenticated users.

This, in turn, is a case of a local file inclusion (LFI) vulnerability, which occurs when a web application includes a file from the server based on poorly validated user input, allowing an attacker to read or execute local files on the server.

CIS Build Kits

“Because Gladinet Cloud Enterprise is running as the NT AUTHORITYSYSTEM user account, the user’s temporary directory will generally be present at C:WindowsTemp,” Huntress explained. “This means that including directory traversal characters .. will allow the application to retrieve any file relative to C:WindowsTempglad_temp. So for example retrieving the file ….explorer.exe would retrieve the file from C:Windowsexplorer.exe.”

As a result of this issue, an attacker can read the contents of the Web.config file, including the machine key required to carry out a deserialization attack and ultimately achieve remote code execution. In the attack detected by Huntress, the threat actors have been found to run reconnaissance commands (e.g., ipconfig /all) passed in the form of a Base64-encoded payload.

The intrusion was ultimately foiled as the infected system was contained before it could progress to the next stage. Users are advised to update to the latest version, or, as previously mentioned, disable the temp handler to thwart exploitation efforts.

(The story was updated after publication to include a response from Huntress. It was updated again on October 16, 2025, to include details about the flaw and the availability of fixes.)



Source

computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates data breach hacker news hacking news how to hack information security network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
Next Article 175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

Watch out for SVG files booby-trapped with malware

September 22, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.