Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature

Posted on November 11, 2025November 11, 2025 By CWS

Google Mandiant has disclosed energetic exploitation of CVE-2025-12480, a essential unauthenticated entry vulnerability in Gladinet’s Triofox file-sharing platform.

The menace cluster tracked as UNC6485 has been weaponizing this flaw since August 2025 to achieve unauthorized administrative entry and set up persistent distant management over compromised techniques.

The vulnerability stems from improper entry management validation in Triofox variations 16.4.10317.56372 and earlier.

AttributeDetailsCVE IDCVE-2025-12480VendorGladinetProductTriofoxVulnerability TypeUnauthenticated Entry Management / Host Header InjectionSeverityCriticalCVSS Score9.8 (estimated)

Attackers exploit an HTTP host header injection method, modifying the Host header to “localhost” to bypass authentication checks and entry the delicate AdminDatabase.aspx configuration web page.

This web page sometimes shows solely throughout preliminary setup. Nevertheless, it turns into uncovered when the authentication operate CanRunCriticalPage() fails to validate the request origin correctly.

exploitation chain

As soon as authenticated, attackers create new administrative accounts and escalate privileges inside the software.

The exploitation chain turns into notably harmful when mixed with Triofox’s built-in anti-virus characteristic misconfiguration.

Attackers can set arbitrary executable paths for the anti-virus scanner, which then runs below the SYSTEM account the best privilege degree in Home windows environments.

Antivirus Characteristic Misconfiguration

In documented assaults, menace actors uploaded malicious batch scripts to revealed file shares, then configured them because the anti-virus engine path.

Anti-virus engine path set to a malicious batch script

When information are uploaded to the share, the malicious script executes robotically with SYSTEM privileges, enabling full system compromise. Submit-exploitation actions reveal the severity of those breaches.

Attackers deployed Zoho Unified Endpoint Administration brokers, adopted by AnyDesk. They renamed the Plink utilities to ascertain encrypted SSH reverse tunnels to command-and-control servers.

This infrastructure enabled attackers to ahead RDP visitors over encrypted channels, sustaining persistent distant desktop entry whereas evading network-based detection techniques.

Mandiant efficiently contained the affected setting inside 16 minutes of alert detection, leveraging Google Safety Operations’ composite detection capabilities.

Figuring out anomalous distant entry device deployment and suspicious file staging actions.

Overview of the post-exploitation exercise

Gladinet launched a patched model 16.7.10368.56560 addressing the vulnerability.

Mandiant recommends rapid upgrades throughout all affected deployments and complete audits of administrative accounts.

Verification that anti-virus engines execute solely licensed binaries, and monitoring for anomalous outbound SSH tunnel visitors indicating potential compromise or lateral motion makes an attempt inside enterprise networks.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Abusing, Antivirus, Execute, Exploiting, Feature, Hackers, Malicious, Payload, TrioFox, Vulnerability

Post navigation

Previous Post: CISA Warns of Samsung Mobile Devices 0-Day RCE Vulnerability Exploited in Attacks
Next Post: SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks

Related Posts

Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory Cyber Security News
New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model Cyber Security News
ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine Cyber Security News
Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk Cyber Security News
Protecting Sensitive Data in Enterprise Systems for Privacy Compliance Cyber Security News
How to Radically Cut Response Time for Each Security Incident  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Triofox Vulnerability Exploited in the Wild
  • Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub
  • New Firefox Protections Halve the Number of Trackable Users
  • CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors
  • ‘Whisper Leak’ LLM Side-Channel Attack Infers User Prompt Topics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Triofox Vulnerability Exploited in the Wild
  • Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub
  • New Firefox Protections Halve the Number of Trackable Users
  • CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors
  • ‘Whisper Leak’ LLM Side-Channel Attack Infers User Prompt Topics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News