
Introduction: what happened
Gladinet has released security updates for its CentreStack file-sharing platform (and Triofox) to fix an actively exploited local file inclusion (LFI) vulnerability tracked as CVE-2025-11371. Attackers were abusing this flaw in the wild to read Web.config, recover the ASP.NET machine key, and then chain to a previously known deserialization/RCE flaw (CVE-2025-30406) for full compromise. A patched CentreStack build 16.10.10408.56683 is now available.
In brief
- Vuln: Unauthenticated LFI in the
/storage/t.dn“temp-download” handler (parameters=…) lets an attacker traverse directories and read files asNT AUTHORITY\SYSTEM. - Exploit chain: Read
Web.config→ extractmachineKey→ craft malicious ViewState → RCE via CVE-2025-30406. - Status: Patch available; admins should upgrade immediately.
- Scope/affected: CentreStack/Triofox builds up to at least 16.7.10368.56560 vulnerable by default configuration.
Context, history, and timeline
- Apr 2025: CVE-2025-30406 (hardcoded/known machine key → ViewState deserialization → RCE) is publicly documented and added to KEV; exploitation observed.
- Oct 9, 2025: Huntress discloses in-the-wild exploitation of a new LFI (CVE-2025-11371) that bypasses prior mitigations by enabling retrieval of
Web.config. - Oct 14–16, 2025: Gladinet makes build 16.10.10408.56683 available with a fix; reporting confirms patch availability.
- Oct 16, 2025: SANS “At-Risk” summarizes the issue for defenders.
Technical analysis: how CVE-2025-11371 leads to RCE
- Entry point:
GET /storage/t.dn?s=../../../../Windows/…(examples vary). The handler insufficiently sanitizessand resolves paths relative to the temp folder as SYSTEM, enabling directory traversal to arbitrary files accessible to that account. - Secret theft: Read
Web.configto obtain the ASP.NETmachineKeyused for ViewState signing. - RCE chain: With the key, an attacker crafts a signed malicious ViewState, exploiting CVE-2025-30406 to deserialize attacker-controlled objects and execute commands on the server. Telemetry observed base64-encoded POSTs immediately after the
t.dnreads. - Affected versions: Default installations ≤ 16.7.10368.56560 were vulnerable; exploitation in the wild confirmed by Huntress and reflected in NVD.
Practical consequences and risk
- Impact: Full server compromise (code execution as the web worker), data theft from mapped back-ends, credential exposure, and lateral movement to file servers/AD.
- Exposure profile: Internet-facing CentreStack/Triofox portals are most at risk; multiple organizations were reported compromised before the patch.
- Detection artifacts:
- Unusual
GET /storage/t.dn?…returningWeb.config. - Subsequent ViewState-heavy POSTs with base64 payloads; suspicious child processes from the IIS worker.
- Unusual
What to do now: operations & hardening checklist
- Patch immediately: Upgrade CentreStack to
16.10.10408.56683or later (use the vendor installer/upgrade flow). - If you cannot patch right away: Disable the temp handler for
UploadDownloadProxyby removing the handler line fromWeb.configas a temporary mitigation. - Hunt for compromise (post-exploitation):
- Review web logs for
GET /storage/t.dnwith traversal ins=and 200 responses. - Inspect IIS logs for large/base64 POSTs to the portal, odd cmd.exe/powershell.exe children of w3wp.exe.
- Rotate machine keys and other secrets if
Web.configaccess is suspected.
- Review web logs for
- Reduce attack surface: Restrict portal exposure (VPN/zero-trust), enforce MFA for admin, least privilege on the host, and keep the product on the latest train noted by the vendor.
- Validation tooling: Consider running an external validation to confirm exposure/mitigation (several vendors published safe checks for CVE-2025-11371).
Differences / comparison with earlier CentreStack issues
- CVE-2025-30406 (Apr 2025) relied on known/hardcoded machine keys in default configs.
- CVE-2025-11371 (Oct 2025) is an LFI that steals your instance-specific
machineKey, letting attackers revive the old ViewState RCE chain even if you previously mitigated 30406—hence the urgency to patch both and rotate keys.
Summary / key takeaways
- A new LFI (CVE-2025-11371) has been actively exploited to recover
machineKeyand achieve RCE via CVE-2025-30406. - Upgrading to 16.10.10408.56683+ is the fastest, safest fix; a config-based handler removal can mitigate in the interim.
- Hunt for
/storage/t.dnaccess and ViewState abuse patterns; rotate keys if compromise is suspected.
Sources / bibliography
- BleepingComputer — Gladinet fixes actively exploited zero-day in file-sharing software (Oct 16, 2025). (BleepingComputer)
- Huntress — Active Exploitation of Gladinet CentreStack and Triofox (CVE-2025-11371) (Oct 2025). (Huntress)
- NVD — CVE-2025-11371 (impact and affected versions). (NVD)
- CentreStack — Latest downloads (shows 16.10.10408.56683 availability). (access.centrestack.com)
- SANS At-Risk Newsletter — summary for defenders (Oct 16, 2025). (SANS Institute)

