Cybersecurity Chaos: Unpatched Flaw Leaves Gladinet Users Vulnerable!

Cybersecurity company Huntress has detected active exploitation of a zero-day vulnerability, CVE-2025-11371, affecting Gladinet CentreStack and TrioFox. This flaw, with a CVSS score of 6.1, allows unintended file disclosure. Users are advised to disable the “temp” handler to mitigate risks while waiting for a patch.

Pro Dashboard

Hot Take:

Looks like the hackers have found yet another zero-day vulnerability to exploit, proving once again that software developers should spend less time dreaming up cool names like “Gladinet CentreStack” and “TrioFox,” and more time patching their products. Who knew that the digital foxes were the ones with the keys to the henhouse?

Key Points:

  • Huntress has identified an unpatched vulnerability in Gladinet CentreStack and TrioFox.
  • The zero-day flaw, CVE-2025-11371, has a CVSS score of 6.1.
  • This bug allows unauthorized access to system files and potential remote code execution.
  • Previous vulnerabilities, such as CVE-2025-30406, have already been exploited in the wild.
  • Users are advised to disable a specific handler to mitigate the risk.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?