Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Active Exploitation Detected in Gladinet and TrioFox Vulnerability

Posted on October 10, 2025October 10, 2025 By CWS

Oct 10, 2025Ravie LakshmananVulnerability / Zero-Day

Cybersecurity firm Huntress stated it has noticed lively in-the-wild exploitation of an unpatched safety flaw impacting Gladinet CentreStack and TrioFox merchandise.
The zero-day vulnerability, tracked as CVE-2025-11371 (CVSS rating: 6.1), is an unauthenticated native file inclusion bug that permits unintended disclosure of system recordsdata. It impacts all variations of the software program previous to and together with 16.7.10368.56560.
Huntress stated it first detected the exercise on September 27, 2025, uncovering that three of its clients have been impacted to date.
It is price noting that each functions had been beforehand affected by CVE-2025-30406 (CVSS rating: 9.0), a case of hard-coded machine key that would enable a risk actor to carry out distant code execution by way of a ViewState deserialization vulnerability. The vulnerability has since come beneath lively exploitation.

CVE-2025-11371, per Huntress, “allowed a risk actor to retrieve the machine key from the appliance Net.config file to carry out distant code execution by way of the aforementioned ViewState deserialization vulnerability. Further particulars of the flaw are being withheld in mild of lively exploration and within the absence of a patch.
In a single occasion investigated by the corporate, the affected model was newer than 16.4.10315.56368 and never susceptible to CVE-2025-30406, suggesting that attackers may exploit earlier variations and use the hard-coded machine key to execute code remotely by way of the ViewState deserialization flaw.

Within the interim, customers are advisable to disable the “temp” handler inside the Net.config file for UploadDownloadProxy situated at “C:Program Information (x86)Gladinet Cloud EnterpriseUploadDownloadProxyWeb.config.”
“It will influence some performance of the platform; nevertheless, it would be sure that this vulnerability can’t be exploited till it’s patched,” Huntress researchers Bryan Masters, James Maclachlan, Jai Minton, and John Hammond stated.

The Hacker News Tags:Active, Detected, Exploitation, Gladinet, TrioFox, Vulnerability

Post navigation

Previous Post: New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users
Next Post: ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

Related Posts

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild The Hacker News
Why Business Impact Should Lead the Security Conversation The Hacker News
Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection The Hacker News
How CISOs Can Drive Effective AI Governance The Hacker News
Why DNS Security Is Your First Defense Against Cyber Attacks? The Hacker News
Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware
  • RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers
  • Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign
  • RondoDox Botnet Takes ‘Exploit Shotgun’ Approach
  • Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware
  • RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers
  • Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign
  • RondoDox Botnet Takes ‘Exploit Shotgun’ Approach
  • Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News