9.8 CVE-2025-14611
CISA Kev Catalog Exploit
Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcoded values for their implementation of the AES cryptoscheme. This degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication. This opens the door for future exploitation and can be leveraged with previous vulnerabilities to gain a full system compromise.
https://nvd.nist.gov/vuln/detail/CVE-2025-14611
Categories
CWE-798
References
134c704f-9b21-4f2e-91b3-4a467353bcc0
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-20... US Government Resource |
5dacb0b8-2277-4717-899c-254586fe4912 Exploit
| https://www.huntress.com/blog/active-exploitation-gladinet-centrestack-triofo... Exploit Third Party Advisory |
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:gladinet:centrestack:*:*:*:*:*:*:*:* | < 16.12.10420.56791 | |
| cpe:2.3:a:gladinet:triofox:*:*:*:*:*:*:*:* | < 16.12.10420.56791 | |
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
Other Nist (github, ...)
| Url |
|---|
| https://www.huntress.com/blog/active-exploitation-gladinet-centrestack-triofo... |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
