Article Details

Scrape Timestamp (UTC): 2025-10-10 09:40:57.226

Source: https://thehackernews.com/2025/10/from-lfi-to-rce-active-exploitation.html

Original Article Text

Click to Toggle View

From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability. Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet CentreStack and TrioFox products. The zero-day vulnerability, tracked as CVE-2025-11371 (CVSS score: 6.1), is an unauthenticated local file inclusion bug that allows unintended disclosure of system files. It impacts all versions of the software prior to and including 16.7.10368.56560. Huntress said it first detected the activity on September 27, 2025, uncovering that three of its customers have been impacted so far. It's worth noting that both applications were previously affected by CVE-2025-30406 (CVSS score: 9.0), a case of hard-coded machine key that could allow a threat actor to perform remote code execution via a ViewState deserialization vulnerability. The vulnerability has since come under active exploitation. CVE-2025-11371, per Huntress, "allowed a threat actor to retrieve the machine key from the application Web.config file to perform remote code execution via the aforementioned ViewState deserialization vulnerability. Additional details of the flaw are being withheld in light of active exploration and in the absence of a patch. In one instance investigated by the company, the affected version was newer than 16.4.10315.56368 and not vulnerable to CVE-2025-30406, suggesting that attackers could exploit earlier versions and use the hard-coded machine key to execute code remotely via the ViewState deserialization flaw. In the interim, users are recommended to disable the "temp" handler within the Web.config file for UploadDownloadProxy located at "C:\Program Files (x86)\Gladinet Cloud Enterprise\UploadDownloadProxy\Web.config." "This will impact some functionality of the platform; however, it will ensure that this vulnerability cannot be exploited until it is patched," Huntress researchers Bryan Masters, James Maclachlan, Jai Minton, and John Hammond said.

Daily Brief Summary

VULNERABILITIES // Active Exploitation of Zero-Day Vulnerability in Gladinet and TrioFox

Huntress has identified active exploitation of a zero-day vulnerability, CVE-2025-11371, in Gladinet CentreStack and TrioFox products, affecting all versions up to 16.7.10368.56560.

The vulnerability is an unauthenticated local file inclusion flaw, allowing unauthorized access to system files, with a CVSS score of 6.1.

Three customers of Huntress have been impacted, with exploitation detected beginning September 27, 2025.

The flaw enables attackers to retrieve a machine key to perform remote code execution via a ViewState deserialization vulnerability.

Users are advised to disable the "temp" handler in the Web.config file to mitigate the risk, impacting some platform functionalities until a patch is available.

Previous vulnerabilities in the same software, such as CVE-2025-30406, have also been exploited, indicating a pattern of security issues.

Companies using these products should remain vigilant and apply recommended mitigations promptly to prevent unauthorized access and potential data breaches.