CVE-2025-11371

7.5 HIGH CISA KEV

📋 TL;DR

An unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and TrioFox allows attackers to read sensitive system files without credentials. This affects all versions up to and including 16.7.10368.56560. Active exploitation has been observed in the wild.

💻 Affected Systems

Products:
  • Gladinet CentreStack
  • Triofox
Versions: All versions prior to and including 16.7.10368.56560
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Default installation is vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive configuration files, credentials, or SSH keys leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized disclosure of sensitive system files, configuration data, and potentially credential harvesting.

🟢

If Mitigated

Limited impact with proper network segmentation and file system permissions restricting access to critical files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation observed in the wild. Simple HTTP requests can trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 16.7.10368.56560

Vendor Advisory: https://www.centrestack.com/p/gce_latest_release.html

Restart Required: Yes

Instructions:

1. Download latest version from vendor site. 2. Backup configuration. 3. Install update. 4. Restart service. 5. Verify version.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to vulnerable endpoints using firewall rules or WAF.

Authentication Enforcement

all

Require authentication for all file access endpoints if supported.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Deploy WAF with LFI protection rules and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Test if unauthenticated file inclusion is possible via HTTP requests to vulnerable endpoints.

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Verify version is above 16.7.10368.56560 and test that file inclusion attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path patterns in HTTP logs
  • Multiple failed file inclusion attempts
  • Access to sensitive system file paths

Network Indicators:

  • HTTP requests with directory traversal patterns
  • Requests for known sensitive files

SIEM Query:

source="web_logs" AND (uri="*../*" OR uri="*..\\*" OR uri="*/etc/passwd*" OR uri="*/windows/win.ini*")

🔗 References

📤 Share & Export