Gladinet’s Great Blunder: CVE-2025-30406 Exploited, Patch ASAP!
The CVE-2025-30406 flaw in Gladinet software is like leaving your door key under the mat. Exploited in the wild, this vulnerability allows remote code execution through hardcoded keys. Seven organizations are affected, with Huntress urging immediate updates or key rotation to prevent attackers from waltzing in uninvited.

Hot Take:
Oh, Gladinet! You had one job: protect your keys, and now you’re on hackers’ speed dial! It’s like leaving your house key under the mat while announcing on Twitter where you live. The CVE-2025-30406 flaw is the cybersecurity equivalent of a rookie mistake, and with a CVSS score of 9.0, it’s the security blunder of the year! Get your patch on, folks, before your servers end up like Swiss cheese!
Key Points:
- Gladinet’s CentreStack and Triofox software have a critical vulnerability, CVE-2025-30406.
- The issue arises from hardcoded machineKeys leading to ViewState deserialization attacks.
- Active exploitation has been reported, affecting seven organizations and 120 endpoints.
- The vulnerability allows remote code execution with potential full server compromise.
- A patch has been released, but immediate action is required for unpatched systems.
Already a member? Log in here