Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability

0
Low
Exploitlocalrce
Published: Fri Oct 10 2025 (10/10/2025, 09:34:00 UTC)
Source: The Hacker News

Description

Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet CentreStack and TrioFox products. The zero-day vulnerability, tracked as CVE-2025-11371 (CVSS score: 6.1), is an unauthenticated local file inclusion bug that allows unintended disclosure of system files. It impacts all versions of the software prior to and

AI-Powered Analysis

AILast updated: 10/11/2025, 01:10:20 UTC

Technical Analysis

The vulnerability CVE-2025-11371 is an unauthenticated local file inclusion (LFI) flaw in Gladinet CentreStack and TrioFox products, impacting all versions up to 16.7.10368.56560. This LFI allows attackers to read arbitrary system files, notably the application’s Web.config file containing the machine key. The machine key is critical as it enables exploitation of a related ViewState deserialization vulnerability (previously tracked as CVE-2025-30406) that allows remote code execution (RCE). Huntress security researchers detected active exploitation in the wild starting September 27, 2025, with at least three customers confirmed impacted. Notably, some affected versions were not vulnerable to the earlier CVE-2025-30406 directly, but the LFI enables retrieval of the machine key to facilitate RCE via the deserialization flaw. Due to active exploitation and lack of an official patch, Huntress recommends disabling the 'temp' handler in the UploadDownloadProxy Web.config file to block the LFI attack vector, though this may degrade some platform functionality. The combination of unauthenticated file inclusion leading to disclosure of sensitive cryptographic keys and subsequent remote code execution makes this a critical attack chain. Details remain partially withheld to prevent further exploitation until patches become available.

Potential Impact

For European organizations using Gladinet CentreStack and TrioFox, this vulnerability poses a significant risk of unauthorized system compromise. The unauthenticated nature of the LFI allows attackers to bypass access controls and retrieve sensitive configuration files, including cryptographic keys. This leads directly to remote code execution, enabling attackers to execute arbitrary code on affected servers, potentially leading to data breaches, ransomware deployment, or lateral movement within networks. Given that these products are often used for cloud storage and file sharing, exploitation could result in exposure or manipulation of sensitive corporate data. The impact extends to operational disruption due to potential system compromise and remediation efforts. Organizations in Europe with these products in critical infrastructure or regulated sectors face heightened risks of compliance violations and reputational damage. Active exploitation in the wild underscores the urgency for mitigation to prevent further incidents.

Mitigation Recommendations

1. Immediately disable the 'temp' handler within the UploadDownloadProxy Web.config file located at 'C:\Program Files (x86)\Gladinet Cloud Enterprise\UploadDownloadProxy\Web.config' as recommended by Huntress. This action blocks the LFI vector but may reduce some platform functionality. 2. Monitor network and application logs for unusual access patterns, especially attempts to access Web.config or other sensitive files. 3. Restrict access to management interfaces and file upload/download endpoints via network segmentation and firewall rules to limit exposure. 4. Implement strict file integrity monitoring on configuration files to detect unauthorized changes or access. 5. Prepare for rapid patch deployment by tracking vendor advisories and applying updates as soon as they are released. 6. Conduct internal audits to identify all instances of Gladinet CentreStack and TrioFox deployments and prioritize remediation efforts accordingly. 7. Educate IT and security teams on the exploitation chain to improve detection and response capabilities. 8. Consider temporary compensating controls such as Web Application Firewalls (WAFs) with custom rules to block suspicious LFI attempts until patches are available.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/10/from-lfi-to-rce-active-exploitation.html","fetched":true,"fetchedAt":"2025-10-11T01:08:52.428Z","wordCount":874}

Threat ID: 68e9ae2654cfe91d8fe9e2e4

Added to database: 10/11/2025, 1:08:54 AM

Last enriched: 10/11/2025, 1:10:20 AM

Last updated: 10/11/2025, 1:02:15 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats