Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature

Posted on November 11, 2025November 11, 2025 By CWS

Google Mandiant has disclosed energetic exploitation of CVE-2025-12480, a essential unauthenticated entry vulnerability in Gladinet’s Triofox file-sharing platform.

The menace cluster tracked as UNC6485 has been weaponizing this flaw since August 2025 to achieve unauthorized administrative entry and set up persistent distant management over compromised techniques.

The vulnerability stems from improper entry management validation in Triofox variations 16.4.10317.56372 and earlier.

AttributeDetailsCVE IDCVE-2025-12480VendorGladinetProductTriofoxVulnerability TypeUnauthenticated Entry Management / Host Header InjectionSeverityCriticalCVSS Score9.8 (estimated)

Attackers exploit an HTTP host header injection method, modifying the Host header to “localhost” to bypass authentication checks and entry the delicate AdminDatabase.aspx configuration web page.

This web page sometimes shows solely throughout preliminary setup. Nevertheless, it turns into uncovered when the authentication operate CanRunCriticalPage() fails to validate the request origin correctly.

exploitation chain

As soon as authenticated, attackers create new administrative accounts and escalate privileges inside the software.

The exploitation chain turns into notably harmful when mixed with Triofox’s built-in anti-virus characteristic misconfiguration.

Attackers can set arbitrary executable paths for the anti-virus scanner, which then runs below the SYSTEM account the best privilege degree in Home windows environments.

Antivirus Characteristic Misconfiguration

In documented assaults, menace actors uploaded malicious batch scripts to revealed file shares, then configured them because the anti-virus engine path.

Anti-virus engine path set to a malicious batch script

When information are uploaded to the share, the malicious script executes robotically with SYSTEM privileges, enabling full system compromise. Submit-exploitation actions reveal the severity of those breaches.

Attackers deployed Zoho Unified Endpoint Administration brokers, adopted by AnyDesk. They renamed the Plink utilities to ascertain encrypted SSH reverse tunnels to command-and-control servers.

This infrastructure enabled attackers to ahead RDP visitors over encrypted channels, sustaining persistent distant desktop entry whereas evading network-based detection techniques.

Mandiant efficiently contained the affected setting inside 16 minutes of alert detection, leveraging Google Safety Operations’ composite detection capabilities.

Figuring out anomalous distant entry device deployment and suspicious file staging actions.

Overview of the post-exploitation exercise

Gladinet launched a patched model 16.7.10368.56560 addressing the vulnerability.

Mandiant recommends rapid upgrades throughout all affected deployments and complete audits of administrative accounts.

Verification that anti-virus engines execute solely licensed binaries, and monitoring for anomalous outbound SSH tunnel visitors indicating potential compromise or lateral motion makes an attempt inside enterprise networks.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Abusing, Antivirus, Execute, Exploiting, Feature, Hackers, Malicious, Payload, TrioFox, Vulnerability

Post navigation

Previous Post: CISA Warns of Samsung Mobile Devices 0-Day RCE Vulnerability Exploited in Attacks
Next Post: SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks

Related Posts

Hackers Actively Exploiting Cisco and Citrix 0-Days in the Wild to Deploy Webshell Cyber Security News
Researchers Created a Linux Rootkit that Evades Elastic Security EDR Detection Cyber Security News
What You Need to Pay Attention to Right Now  Cyber Security News
APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures Cyber Security News
DragonForce Cartel Emerges From the Leaked Source Code of Conti v3 Ransomware Cyber Security News
SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Claim Breach of WIRED Database Containing 2.3 million Subscriber Records
  • MongoDB Servers at Critical Risk
  • Ubisoft Rainbow Six Siege Servers Breach linked to MongoBleed Vulnerability
  • 87,000+ MongoDB Instances Vulnerable to MongoBleed Flaw Exposed Online
  • Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Claim Breach of WIRED Database Containing 2.3 million Subscriber Records
  • MongoDB Servers at Critical Risk
  • Ubisoft Rainbow Six Siege Servers Breach linked to MongoBleed Vulnerability
  • 87,000+ MongoDB Instances Vulnerable to MongoBleed Flaw Exposed Online
  • Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark