CentreStack Chaos: New Patch Tackles Exploited Vulnerability

Gladinet recently patched a CentreStack vulnerability, CVE-2025-11371, that was being exploited in the wild. This bug allowed attackers to retrieve system files and execute remote code. With the flaw’s active exploitation, organizations should apply these patches pronto to avoid giving hackers a front-row seat to their systems’ secrets.

Pro Dashboard

Hot Take:

Looks like Gladinet’s CentreStack had a bad case of the flu—security flu, that is. But don’t worry, folks, the patch is in! If only fixing all bugs was as easy as applying a digital Band-Aid. Remember, folks, patching isn’t just for pirates and quilt makers; it’s also for keeping your systems safe from cyber scallywags.

Key Points:

  • Gladinet released patches for a CentreStack vulnerability, CVE-2025-11371, in the wild since late September.
  • The flaw allows attackers to retrieve system files and execute remote code.
  • Exploitation involves a ViewState deserialization vulnerability, with the machineKey being a key target.
  • The bug impacts CentreStack and TrioFox products, both in their default states.
  • Patching is crucial to prevent system compromise and is available in CentreStack version 16.10.10408.56683.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?