Huntress has observed active exploitation in the wild of an unpatched zero-day vulnerability affecting Gladinet CentreStack and TrioFox products. The issue is a local file inclusion (LFI) vulnerability identified as CVE-2025-11371 that allows unauthenticated attackers to disclose unintended system files, potentially exposing sensitive data. This vulnerability impacts all versions of the affected software before the latest patch release.
The vulnerability poses significant risks as unauthenticated attackers can access system files, which can lead to further exploitation such as remote code execution if combined with other vulnerabilities. Given the publicly known active exploitation and the potential impact on system confidentiality and integrity, timely patches and mitigations are critical for affected users. Organizations using these products should prioritize patch deployment to reduce their attack surface.
This incident highlights continuing challenges in software security maintenance and the importance of rapid vulnerability disclosure and response. Failure to address such flaws can lead to data breaches and system compromise, underscoring the need for robust cybersecurity hygiene practices within affected enterprises.
👉 Pročitaj original: The Hacker News