Triofox 0-Day Abuse of Anti-Virus Function Enables Remote Payload Execution

Cybersecurity researchers from Mandiant have uncovered a critical zero-day vulnerability in Gladinet’s Triofox file-sharing platform.

The flaw, tracked as CVE-2025-12480, was actively exploited by the threat actor group UNC6485 starting August 24, 2025, to bypass authentication and execute malicious code with system-level access.

How the Attack Works

The exploitation involved a two-step process that was remarkably simple yet devastatingly effective. First, attackers manipulated HTTP host headers by setting them to “localhost” in their requests.

This bypassed authentication controls, granting unauthorized access to restricted configuration pages.

CVE-2025-12480 exploitation chain
CVE-2025-12480 exploitation chain

The vulnerability existed in Triofox’s CanRunCriticalPage() function, which incorrectly trusted the host header without validating that requests actually originated from the local system.

This allowed remote attackers to spoof their source IP address.

After gaining initial access, UNC6485 created a new administrator account called “Cluster Admin” through the compromised setup interface.

 Overview of the post-exploitation activity
 Overview of the post-exploitation activity

They then exploited a second weakness in Triofox’s built-in antivirus scanner.

The attackers discovered they could configure the anti-virus scanner path to point to their own malicious batch script instead of legitimate security software.

When files were uploaded to shared folders, Triofox automatically executed the attacker’s payload with full SYSTEM account privileges.

Using this technique, UNC6485 deployed multiple remote access tools, including Zoho Remote Access, AnyDesk, and SSH utilities like Plink and PuTTY.

These enabled encrypted connections to their command-and-control servers for enumeration and privilege escalation attempts.

Mandiant identified the intrusion within 16 minutes using Google Security Operations, spotting suspicious deployments of remote access utilities and unusual file activity in temporary directories.

Security teams noticed anomalous HTTP logs showing external requests with localhost referrer headers.

Companies running Triofox should immediately upgrade to version 16.7.10368.56560 or later.

Security teams should audit all administrator accounts for unauthorized entries, verify anti-virus configurations, and hunt for attacker tools using Mandiant’s detection queries.

Monitoring for unusual outbound SSH traffic can help identify ongoing compromises.

AttributeDetails
CVE IDCVE-2025-12480
VendorGladinet
ProductTriofox
Vulnerability TypeUnauthenticated Access Control / Host Header Injection
SeverityCritical
CVSS Score9.8
Affected Versions16.4.10317.56372 and earlier
Patched Version16.7.10368.56560
Threat ActorUNC6485
Active ExploitationAugust 24, 2025

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here