Gladinet CentreStack and Triofox 0-Day Flaw Under Active Attack


Gladinet CentreStack and Triofox have come under active attack as threat actors exploit an unauthenticated local file inclusion flaw (CVE-2025-11371).

The flaw lets attackers read sensitive files without logging in. Once they grab the machine key, they can trigger a view state deserialization bug to run code on the server. There is no official patch yet, so administrators must apply the available workaround immediately.

CVE Identifier Vulnerability Type Affected Products CVSS 3.1 Score
CVE-2025-11371 Local File Inclusion CentreStack, Triofox 9.1

Zero-Day Exploitation Detected in the Wild

On September 27, 2025, Huntress’s security operations center spotted successful exploitation attempts against CentreStack instances.

The affected systems were running versions later than 16.4.10315.56368, which no longer suffer from the earlier CVE-2025-30406 deserialization flaw.

Deeper analysis revealed a fresh local file inclusion hole allowing threat actors to fetch the Web.config file and extract the machine key. With this key, attackers re-used the old view state deserialization method to deploy remote code execution.

 Detection timeline for observed exploitation activity
 Detection timeline for observed exploitation activity

Huntress observers confirmed at least three customers saw in-the-wild abuse. Detection relied on spotting unusual base64 payloads spawned under web server processes.

Once detected, analysts isolated affected hosts to stop further compromise. A timeline of these events pinpoints the first successful attack at 20:48:37 UTC on September 26, 2025.

Mitigation Steps to Prevent Exploitation

Until a patch is released, vulnerable organizations should apply an immediate workaround.

Administrators must disable the temp handler entry in the UploadDownloadProxy Web.config file, which prevents the flaw from being triggered:

C:Program Files (x86)Gladinet Cloud EnterpriseUploadDownloadProxyWeb.config

Removing the highlighted temp handler line cuts off access to the t.dn endpoint.

A visual of the temp handler pointing to t.dn, which can be disabled as a mitigationA visual of the temp handler pointing to t.dn, which can be disabled as a mitigation
A visual of the temp handler pointing to t.dn, which can be disabled as a mitigation

This change may affect some file upload or download functions, but it is critical to block active attacks. After disabling the handler, restart the web service to ensure the change takes effect.

Gladinet has acknowledged the vulnerability and is working on customer notifications for this workaround.

Huntress reached out under its standard disclosure policy, received confirmation, and shared mitigation advice with impacted clients. A formal patch is expected soon.

Below is a proof-of-concept snippet that demonstrates how an attacker fetches the Web.config file via the LFI flaw:

GET /UploadDownloadProxy/temp?file=../../Web.config HTTP/1.1

Host: vulnerable-centrestack.example.com

User-Agent: Mozilla/5.0

Accept: */*

Connection: close

After retrieving Web.config, the attacker decodes the view state key and crafts a malicious POST:



  BASE64_ENCODED_DESERIALIZED_PAYLOAD

This payload triggers remote code execution under the web server context. Administrators are urged to monitor logs for such POST requests and base64-like data within viewStateBlob parameters until the permanent fix is available.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.