Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature

Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature

Posted on November 11, 2025November 11, 2025 By CWS

Google Mandiant has disclosed energetic exploitation of CVE-2025-12480, a essential unauthenticated entry vulnerability in Gladinet’s Triofox file-sharing platform.

The menace cluster tracked as UNC6485 has been weaponizing this flaw since August 2025 to achieve unauthorized administrative entry and set up persistent distant management over compromised techniques.

The vulnerability stems from improper entry management validation in Triofox variations 16.4.10317.56372 and earlier.

AttributeDetailsCVE IDCVE-2025-12480VendorGladinetProductTriofoxVulnerability TypeUnauthenticated Entry Management / Host Header InjectionSeverityCriticalCVSS Score9.8 (estimated)

Attackers exploit an HTTP host header injection method, modifying the Host header to “localhost” to bypass authentication checks and entry the delicate AdminDatabase.aspx configuration web page.

This web page sometimes shows solely throughout preliminary setup. Nevertheless, it turns into uncovered when the authentication operate CanRunCriticalPage() fails to validate the request origin correctly.

exploitation chain

As soon as authenticated, attackers create new administrative accounts and escalate privileges inside the software.

The exploitation chain turns into notably harmful when mixed with Triofox’s built-in anti-virus characteristic misconfiguration.

Attackers can set arbitrary executable paths for the anti-virus scanner, which then runs below the SYSTEM account the best privilege degree in Home windows environments.

Antivirus Characteristic Misconfiguration

In documented assaults, menace actors uploaded malicious batch scripts to revealed file shares, then configured them because the anti-virus engine path.

Anti-virus engine path set to a malicious batch script

When information are uploaded to the share, the malicious script executes robotically with SYSTEM privileges, enabling full system compromise. Submit-exploitation actions reveal the severity of those breaches.

Attackers deployed Zoho Unified Endpoint Administration brokers, adopted by AnyDesk. They renamed the Plink utilities to ascertain encrypted SSH reverse tunnels to command-and-control servers.

This infrastructure enabled attackers to ahead RDP visitors over encrypted channels, sustaining persistent distant desktop entry whereas evading network-based detection techniques.

Mandiant efficiently contained the affected setting inside 16 minutes of alert detection, leveraging Google Safety Operations’ composite detection capabilities.

Figuring out anomalous distant entry device deployment and suspicious file staging actions.

Overview of the post-exploitation exercise

Gladinet launched a patched model 16.7.10368.56560 addressing the vulnerability.

Mandiant recommends rapid upgrades throughout all affected deployments and complete audits of administrative accounts.

Verification that anti-virus engines execute solely licensed binaries, and monitoring for anomalous outbound SSH tunnel visitors indicating potential compromise or lateral motion makes an attempt inside enterprise networks.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Abusing, Antivirus, Execute, Exploiting, Feature, Hackers, Malicious, Payload, TrioFox, Vulnerability

Post navigation

Previous Post: CISA Warns of Samsung Mobile Devices 0-Day RCE Vulnerability Exploited in Attacks
Next Post: SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks

Related Posts

Identity and Access Management Trends Shaping 2025 Identity and Access Management Trends Shaping 2025 Cyber Security News
MITRE Publishes Post-Quantum Cryptography Migration Roadmap MITRE Publishes Post-Quantum Cryptography Migration Roadmap Cyber Security News
Hackers Using Calendly-Themed Phishing Attack to Steal Google Workspace Account Hackers Using Calendly-Themed Phishing Attack to Steal Google Workspace Account Cyber Security News
PoC Exploit Released for BIND 9 Vulnerability that Let Attackers Forge DNS Records PoC Exploit Released for BIND 9 Vulnerability that Let Attackers Forge DNS Records Cyber Security News
What You Need to Pay Attention to Right Now  What You Need to Pay Attention to Right Now  Cyber Security News
Oracle Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack Oracle Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News