Home » From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability

From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability

by Samantha Rowland
2 minutes read

In a recent development that has raised serious concerns in the cybersecurity realm, Huntress, a prominent cybersecurity company, has uncovered evidence of active in-the-wild exploitation targeting an unpatched security vulnerability affecting Gladinet CentreStack and TrioFox products.

This zero-day vulnerability, identified as CVE-2025-11371 with a CVSS score of 6.1, represents a critical unauthenticated local file inclusion (LFI) flaw. This vulnerability enables threat actors to access system files without proper authentication, potentially leading to the exposure of sensitive information. What makes this even more alarming is that the vulnerability affects all versions of the software preceding the latest patch.

Local file inclusion vulnerabilities are particularly dangerous as they can be leveraged by attackers to execute a variety of malicious activities, including remote code execution (RCE). By exploiting an LFI vulnerability, threat actors can manipulate file inclusions to execute arbitrary code on the target system, effectively gaining unauthorized access and control.

The implications of such active exploitation are far-reaching and underscore the urgent need for organizations to prioritize security measures and promptly apply patches and updates. Failure to address these vulnerabilities in a timely manner can leave systems and sensitive data exposed to malicious actors, potentially resulting in data breaches, system compromise, and financial losses.

To mitigate the risks posed by the Gladinet CentreStack and TrioFox vulnerability, organizations are advised to take immediate action. This includes:

  • Patch Management: Organizations should ensure that they are up to date with the latest security patches released by the software vendors. Applying patches promptly can help close known vulnerabilities and enhance the overall security posture.
  • Security Monitoring: Implementing robust security monitoring mechanisms can help detect any suspicious activities or unauthorized access attempts. Continuous monitoring is essential for identifying and mitigating security incidents in a timely manner.
  • Access Control: Restricting access to sensitive system files and directories can help limit the impact of potential exploitation. Implementing the principle of least privilege can minimize the exposure of critical assets to unauthorized users.
  • Security Awareness: Educating employees about the importance of cybersecurity best practices, such as avoiding clicking on suspicious links or downloading unknown files, can help prevent successful exploitation attempts by threat actors.

By taking proactive steps to address vulnerabilities and enhance security measures, organizations can better protect their systems and data from malicious exploitation. Collaborative efforts between cybersecurity experts, software vendors, and end-users are essential in combating the evolving threat landscape and safeguarding digital assets.

In conclusion, the active exploitation of the Gladinet CentreStack and TrioFox vulnerability serves as a stark reminder of the persistent cybersecurity challenges faced by organizations today. By staying vigilant, staying informed, and implementing best practices, businesses can strengthen their defenses against malicious actors and safeguard their digital environments.

You may also like