Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, which enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. NOTE: the CentreStack admin can manually delete the machineKey defined in portal\web.config.
According to Huntress:
"It is very important to note that this weakness also affects Gladinet Triofox, up to version 16.4.10317.56372. By default, previous versions of the Triofox software have the same hardcoded cryptographic keys in their configuration file, and can be easily abused for remote code execution." See references.
🚨 Marked as known exploited on April 8th, 2025 (9 days ago).
CVE ID: CVE-2025-30406
CVSS Base Severity: CRITICAL
CVSS Base Score: 9.8
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor: n/a
Product: n/a
http/cves/2025/CVE-2025-30406.yaml
EPSS Score: 58.51% (probability of being exploited)
EPSS Percentile: 98.03% (scored less or equal to compared to others)
EPSS Date: 2025-04-16 (when was this score calculated)