Zero-Day Drama: Gladinet CentreStack and Triofox Under Siege!
CVE-2025-11371 is the gift that keeps on giving—except no one wants it. This unpatched zero-day flaw in Gladinet CentreStack and Triofox lets local users snoop through system files like a nosy neighbor. While experts figure out a patch, businesses are advised to disable the temp handler and brace for some lost functionality.

Hot Take:
Another day, another zero-day! The cyber villains have found a new playground in Gladinet CentreStack and Triofox, and they’re not playing nice. It’s like a never-ending game of whack-a-mole, except the moles are hackers, and the hammer is… well, currently missing. Time to batten down the hatches, folks, and maybe consider a career in patchwork quilting because these cybersecurity patches are taking their sweet time!
Key Points:
– CVE-2025-11371 is a zero-day vulnerability in Gladinet CentreStack and Triofox.
– The flaw allows unauthorized access to system files via Local File Inclusion (LFI).
– There’s no patch yet, but mitigations are available.
– A workaround involves disabling certain functionality in Web.config.
– At least three customers have already been targeted.
Zero-Day Zingers!
If you’ve ever wondered what a zero-day feels like, imagine finding out your favorite coffee shop has run out of espresso on a Monday morning. That’s the kind of day Gladinet and Triofox users are having. CVE-2025-11371, an LFI flaw, is the latest unwelcome guest crashing the cybersecurity party. This particular gremlin allows local users to sneak a peek at system files without so much as a “by your leave,” effectively turning your secure file-sharing solution into a leaky faucet of sensitive data.
The Gladinet Gag
Gladinet CentreStack and Triofox are the unsung heroes of the corporate world, designed to make remote work a breeze. They provide a secure platform for file sharing, syncing, and collaboration, enabling companies to offer cloud-like access to internal file servers while maintaining control over data. But alas, even heroes have their kryptonite. In this case, it’s the CVE-2025-11371 zero-day flaw. Until a patch arrives, the best advice is to disable the temp handler in UploadDownloadProxy’s Web.config to keep those nosy hackers at bay. But beware, some platform functionality might take a hit. Sorry, folks, no free lunch today!
Huntress to the Rescue
In the latest cybersecurity thriller, Huntress plays the role of the detective, pointing a magnifying glass at the zero-day mischief. Their report warns of a past vulnerability (CVE-2025-30406) that allowed remote code execution through a ViewState deserialization vulnerability. Now, with the newly discovered CVE-2025-11371, threat actors can retrieve the machine key from the application Web.config file to perform more digital monkey business. The advice? Keep your Web.config squeaky clean and follow the workaround until a more permanent solution surfaces.
Patchwork Problems and Mitigations
For those who love a good DIY project, mitigating the CVE-2025-11371 isn’t quite like assembling flat-pack furniture, but it’s in the ballpark. Gladinet and Huntress suggest disabling the temp handler in UploadDownloadProxy’s Web.config. Imagine covering a leaky pipe with duct tape—it’s not pretty, but it’ll hold until the plumber (or patch) arrives. This workaround prevents the vulnerability from being exploited, but some functionality might be affected. Consider it a temporary sacrifice for the greater good of data security.
In Conclusion: Zero-Day Déjà Vu
As Pierluigi Paganini from Security Affairs points out, zero-day vulnerabilities are as common as cat videos on the internet. The best defense is to stay informed and proactive. While Gladinet and Triofox scramble to patch the CVE-2025-11371 flaw, users are advised to implement the recommended workaround and cross their fingers. Remember, cybersecurity is a bit like a game of chess—stay one step ahead, and don’t let the hackers shout “checkmate!” Until then, keep your systems as tight as a drum and your Web.config files cleaner than a whistle.
