Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature

Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature

Posted on November 11, 2025November 11, 2025 By CWS

Google Mandiant has disclosed energetic exploitation of CVE-2025-12480, a essential unauthenticated entry vulnerability in Gladinet’s Triofox file-sharing platform.

The menace cluster tracked as UNC6485 has been weaponizing this flaw since August 2025 to achieve unauthorized administrative entry and set up persistent distant management over compromised techniques.

The vulnerability stems from improper entry management validation in Triofox variations 16.4.10317.56372 and earlier.

AttributeDetailsCVE IDCVE-2025-12480VendorGladinetProductTriofoxVulnerability TypeUnauthenticated Entry Management / Host Header InjectionSeverityCriticalCVSS Score9.8 (estimated)

Attackers exploit an HTTP host header injection method, modifying the Host header to “localhost” to bypass authentication checks and entry the delicate AdminDatabase.aspx configuration web page.

This web page sometimes shows solely throughout preliminary setup. Nevertheless, it turns into uncovered when the authentication operate CanRunCriticalPage() fails to validate the request origin correctly.

exploitation chain

As soon as authenticated, attackers create new administrative accounts and escalate privileges inside the software.

The exploitation chain turns into notably harmful when mixed with Triofox’s built-in anti-virus characteristic misconfiguration.

Attackers can set arbitrary executable paths for the anti-virus scanner, which then runs below the SYSTEM account the best privilege degree in Home windows environments.

Antivirus Characteristic Misconfiguration

In documented assaults, menace actors uploaded malicious batch scripts to revealed file shares, then configured them because the anti-virus engine path.

Anti-virus engine path set to a malicious batch script

When information are uploaded to the share, the malicious script executes robotically with SYSTEM privileges, enabling full system compromise. Submit-exploitation actions reveal the severity of those breaches.

Attackers deployed Zoho Unified Endpoint Administration brokers, adopted by AnyDesk. They renamed the Plink utilities to ascertain encrypted SSH reverse tunnels to command-and-control servers.

This infrastructure enabled attackers to ahead RDP visitors over encrypted channels, sustaining persistent distant desktop entry whereas evading network-based detection techniques.

Mandiant efficiently contained the affected setting inside 16 minutes of alert detection, leveraging Google Safety Operations’ composite detection capabilities.

Figuring out anomalous distant entry device deployment and suspicious file staging actions.

Overview of the post-exploitation exercise

Gladinet launched a patched model 16.7.10368.56560 addressing the vulnerability.

Mandiant recommends rapid upgrades throughout all affected deployments and complete audits of administrative accounts.

Verification that anti-virus engines execute solely licensed binaries, and monitoring for anomalous outbound SSH tunnel visitors indicating potential compromise or lateral motion makes an attempt inside enterprise networks.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Abusing, Antivirus, Execute, Exploiting, Feature, Hackers, Malicious, Payload, TrioFox, Vulnerability

Post navigation

Previous Post: CISA Warns of Samsung Mobile Devices 0-Day RCE Vulnerability Exploited in Attacks
Next Post: SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks

Related Posts

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers Cyber Security News
Threat Actors Leversges Google Cloud Services to Steal Microsoft 365 Logins Threat Actors Leversges Google Cloud Services to Steal Microsoft 365 Logins Cyber Security News
Linux Firewall IPFire 2.29 Core Update 195 Released With VPN Protocol Support Linux Firewall IPFire 2.29 Core Update 195 Released With VPN Protocol Support Cyber Security News
Axis Camera Server Vulnerabilities Exposes Thousands of Organizations to Attack Axis Camera Server Vulnerabilities Exposes Thousands of Organizations to Attack Cyber Security News
Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Cyber Security News
Network Communication Blocker Tool That Neutralizes EDR/AV Network Communication Blocker Tool That Neutralizes EDR/AV Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Meta to Cease Instagram E2EE Messaging by 2026
  • Loblaw Data Breach Exposes Customer Information
  • Microsoft Issues Urgent Patch for Windows 11 Security Flaws
  • FortiGate Firewall Breaches Exploit Critical Vulnerabilities
  • OpenClaw AI Vulnerabilities Pose Security Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Meta to Cease Instagram E2EE Messaging by 2026
  • Loblaw Data Breach Exposes Customer Information
  • Microsoft Issues Urgent Patch for Windows 11 Security Flaws
  • FortiGate Firewall Breaches Exploit Critical Vulnerabilities
  • OpenClaw AI Vulnerabilities Pose Security Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News