Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Hackers are exploiting a zero-day in Gladinet file sharing software
    Security

    Hackers are exploiting a zero-day in Gladinet file sharing software

    PineapplesUpdateBy PineapplesUpdateOctober 11, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Hackers are exploiting a zero-day in Gladinet file sharing software
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hackers are exploiting a zero-day in Gladinet file sharing software

    Threat actors are exploiting a zero-day vulnerability (CVE-2025-11371) in Gladinet CenterStack and Triofox products, which allows a local attacker to access system files without authentication.

    At least three companies have been targeted so far. Although no patch is available yet, customers can apply mitigations.

    CenterStack and Triofox are Gladinet’s commercial solutions for file sharing and remote access that allow the company’s own storage to be used as a cloud. According to the vendor, Centerstack is used by “thousands of businesses in more than 49 countries.”

    No fix, all versions affected

    The zero-day vulnerability CVE-2025-11371 is a local file inclusion (LFI) flaw that affects the default installation and configuration of both products, affecting all versions including the latest release, 16.7.10368.56560.

    Researchers at managed cybersecurity platform Huntress discovered the security issue on September 27 when a threat actor successfully exploited it to obtain machine keys and remotely execute code.

    A closer analysis revealed that the problem was caused by LFI being leveraged to read Web.config and extract the machine key. This allowed the attacker to exploit an old deserialization vulnerability (CVE-2025-30406) and achieve remote code execution (RCE). viewstate,

    The CVE-2025-30406 deserialization bug in CenterStack and Trifox was also wildly exploited in March, and was caused by a hardcoded machine key. An attacker knowing the key can execute RCE on the affected system.

    “After subsequent analysis, Huntress discovered the exploitation of an unauthenticated local file inclusion vulnerability (CVE-2025-11371) that allowed a threat actor to retrieve machine keys from the application Web.config file to perform remote code execution via the above viewstate deserialization vulnerability” – huntress

    Huntress contacts Gladinate to inform him of the discovery. The vendor confirmed that it was aware of the vulnerability and said it was in the process of notifying customers about the workaround until a patch is available.

    The researchers shared the mitigation with the targeted customer and published the following recommendations to protect against CVE-2025-11371:

    1. Disable the temporary handler in the Web.config file for the UploadDownloadProxy component at “C:\Program Files (x86)\Gladinet Cloud Enterprise\UploadDownloadProxy\Web.config”
    2. Locate and delete the line that defines the temp handler – it points to t.dn
    the line that needs to be removed
    the line that needs to be removed
    Source: Shirika

    This line enables vulnerable functionality that attackers exploit via local file inclusion, so removing it could prevent the exploitation of CVE-2025-11371.

    The researchers warn that the mitigation “will impact some functionality of the platform”, but ensure that the vulnerability cannot be exploited.


    PICS BAS Summit

    attend Breach and Attack Simulation Summit and experience future of security verificationHear from top experts and see how AI-powered BAS Changing breach and attack simulations.

    Don’t miss the event that will shape the future of your security strategy

    exploiting file Gladinet hackers sharing Software zeroday
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleOpen-source DFIR VelociRaptor misused in expanding ransomware attempts
    Next Article The most important Intel Panther Lake update is the least talked about – I’ll explain
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How a simple link allowed hackers to bypass Copilot’s security guardrails – and what Microsoft did about it

    January 19, 2026
    Startups

    Interest in Spoor’s bird-watching AI software is growing

    December 11, 2025
    Startups

    Waiting on a large file transfer? How to Zip Files Like a Pro (and Save Time) in Windows 11

    November 24, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.