CentreStack Chaos: New Patch Tackles Exploited Vulnerability
Gladinet recently patched a CentreStack vulnerability, CVE-2025-11371, that was being exploited in the wild. This bug allowed attackers to retrieve system files and execute remote code. With the flaw’s active exploitation, organizations should apply these patches pronto to avoid giving hackers a front-row seat to their systems’ secrets.

Hot Take:
Looks like Gladinet’s CentreStack had a bad case of the flu—security flu, that is. But don’t worry, folks, the patch is in! If only fixing all bugs was as easy as applying a digital Band-Aid. Remember, folks, patching isn’t just for pirates and quilt makers; it’s also for keeping your systems safe from cyber scallywags.
Key Points:
- Gladinet released patches for a CentreStack vulnerability, CVE-2025-11371, in the wild since late September.
- The flaw allows attackers to retrieve system files and execute remote code.
- Exploitation involves a ViewState deserialization vulnerability, with the machineKey being a key target.
- The bug impacts CentreStack and TrioFox products, both in their default states.
- Patching is crucial to prevent system compromise and is available in CentreStack version 16.10.10408.56683.
Already a member? Log in here
