Home » News » Gladinet Zero-Day Exploit: File Sharing Hackers Target Users

Gladinet Zero-Day Exploit: File Sharing Hackers Target Users

by Sophie Lin - Technology Editor

Gladinet Zero-Day: A Harbinger of Rising Risk for Self-Hosted Cloud Solutions

Over 3,000 businesses in nearly 50 countries trust Gladinet CentreStack and Triofox to build their own private clouds. But a recently discovered zero-day vulnerability (CVE-2025-11371) is a stark reminder that the convenience of self-hosted solutions doesn’t eliminate the need for rigorous security – and that even previously exploited weaknesses can be chained for devastating effect. The flaw, a Local File Inclusion (LFI), is actively being exploited, and while a patch isn’t yet available, understanding the implications is critical for any organization relying on similar platforms.

The Anatomy of the Attack: From LFI to Remote Code Execution

Researchers at Huntress first detected the exploitation of CVE-2025-11371 on September 27th. The vulnerability allows an unauthenticated attacker to read sensitive system files, specifically the Web.config file. This isn’t a standalone issue; attackers are leveraging the information gleaned from Web.config – namely, a hardcoded machine key – to re-exploit an older deserialization vulnerability (CVE-2025-30406) that surfaced in March. This combination allows for Remote Code Execution (RCE), giving attackers complete control of affected systems.

As Huntress explained, the process unfolds like this: the LFI vulnerability retrieves the machine key, which then unlocks the deserialization bug, ultimately leading to RCE via ViewState. This chaining of vulnerabilities highlights a dangerous trend: attackers aren’t just looking for new flaws, they’re actively revisiting and repurposing known weaknesses.

Why Self-Hosted Clouds Are Increasingly in the Crosshairs

The appeal of solutions like Gladinet CentreStack and Triofox is clear: greater control over data, reduced reliance on third-party providers, and potential cost savings. However, this control comes with increased responsibility. Organizations are essentially becoming their own cloud providers, inheriting all the security challenges that entails. And those challenges are growing.

Several factors are contributing to this increased risk:

  • The Rise of DIY IT: More companies are opting for self-managed infrastructure to avoid vendor lock-in and customize their environments.
  • Complexity of Modern Applications: Applications like CentreStack, offering complex functionality, often have larger attack surfaces.
  • Patching Fatigue: Keeping up with security updates across a diverse IT landscape is a constant struggle.
  • Attacker Sophistication: Threat actors are becoming more adept at identifying and exploiting vulnerabilities in less-protected environments.

Mitigation Steps: A Temporary Shield, Not a Cure

Gladinet has acknowledged the vulnerability and is working on a patch. In the meantime, Huntress has provided a mitigation: disable the temp handler in the Web.config file for the UploadDownloadProxy component located at “C:Program Files (x86)Gladinet Cloud EnterpriseUploadDownloadProxyWeb.config”. Specifically, remove the line that defines the temp handler pointing to t.dn. While effective in preventing exploitation of CVE-2025-11371, Gladinet warns that this workaround will impact some platform functionality.

This situation underscores a critical point: mitigations are not substitutes for patches. They are temporary measures to reduce immediate risk, but they often introduce trade-offs and don’t address the underlying vulnerability. Organizations should prioritize applying patches as soon as they become available.

The Future of Vulnerability Management: Proactive Security is Paramount

The Gladinet zero-day is a microcosm of a larger trend: the increasing speed and sophistication of attacks. Traditional reactive security approaches – waiting for vulnerabilities to be discovered and then patching them – are no longer sufficient. Organizations need to embrace a proactive security posture that includes:

  • Regular Vulnerability Scanning: Identify and assess vulnerabilities before attackers do.
  • Penetration Testing: Simulate real-world attacks to uncover weaknesses in your defenses.
  • Threat Intelligence: Stay informed about emerging threats and vulnerabilities.
  • Robust Patch Management: Implement a streamlined process for applying security updates.
  • Attack Surface Reduction: Minimize the number of potential entry points for attackers.

Furthermore, the re-exploitation of CVE-2025-30406 demonstrates the importance of comprehensive vulnerability management. Even vulnerabilities that have been previously addressed can be resurrected in new attack chains. Organizations must maintain a complete inventory of their vulnerabilities and prioritize remediation based on risk.

The era of assuming your self-hosted cloud is secure simply because you control the infrastructure is over. The Gladinet incident serves as a potent reminder that vigilance, proactive security measures, and a commitment to rapid patching are essential for protecting your data and systems. What steps are *you* taking to proactively manage vulnerabilities in your environment? Share your thoughts in the comments below!

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Adblock Detected

Please support us by disabling your AdBlocker extension from your browsers for our website.