A critical zero-day vulnerability, CVE-2025-12480, in Gladinet's Triofox file-sharing platform is under active exploitation by a threat cluster identified by Mandiant as UNC6485. The flaw, rated 9.1 (Critical), allows unauthenticated attackers to bypass authentication and achieve remote code execution (RCE) with SYSTEM-level privileges. The attackers were observed exploiting this vulnerability as early as August 2025. The attack involves spoofing the HTTP Host header to gain administrative access and then abusing a legitimate antivirus integration to execute malicious scripts. This marks the third major vulnerability in Gladinet products exploited in 2025, highlighting a significant risk for organizations using this platform. A patch is available and must be applied urgently.
The vulnerability, CVE-2025-12480, is an improper access control issue in Triofox versions prior to 16.7.10368.56560. It allows an unauthenticated, remote attacker to gain complete control of an affected system. The threat actor UNC6485 has been leveraging this flaw since at least August 24, 2025, demonstrating a sophisticated understanding of the application's architecture. The attack vector is particularly insidious as it abuses legitimate system functionalities, making detection challenging for security tools that are not specifically looking for this attack pattern.
The attack chain begins with the attacker sending a specially crafted HTTP request with the Host header set to localhost. This tricks the Triofox application into granting access to the initial setup page, which is normally only accessible during installation. From there, the attacker creates a new native administrator account, effectively gaining full control over the platform's configuration.
The attack proceeds in several distinct stages, as detailed by Google's Threat Intelligence Group:
Initial Access & Authentication Bypass (T1190 - Exploit Public-Facing Application): The attacker sends an HTTP request to the Triofox server from an external IP address but modifies the Host header to localhost. The application incorrectly processes this request as originating locally, granting access to the setup wizard.
Privilege Escalation & Persistence (T1078.001 - Valid Accounts: Default/Initial Accounts): Using the access granted in the previous step, the attacker creates a new administrator account, which they named Cluster Admin in observed incidents. This provides them with persistent, high-privilege access to the Triofox web interface.
Execution (T1106 - Native API): The core of the RCE technique involves abusing the integrated antivirus scanner feature. The attacker navigates to the antivirus configuration page and modifies the path of the scanner engine to point to a malicious batch script they previously uploaded. When a file is uploaded to the platform, the Triofox server executes this malicious script with NT AUTHORITY\SYSTEM privileges.
Defense Evasion & Command and Control: Following the successful RCE, UNC6485 deploys commercial remote access tools like Zoho UEMS and AnyDesk (T1219 - Remote Access Software). They also establish reverse SSH tunnels using Plink and PuTTY (T1572 - Protocol Tunneling) to maintain persistent access and exfiltrate data.
The successful exploitation of CVE-2025-12480 results in a full system compromise. An attacker can execute arbitrary code with the highest possible privileges, allowing them to:
Given that Triofox is a central file access and sharing solution, the business impact is severe. The breach could lead to significant data loss, regulatory fines, and reputational damage. The use of legitimate remote access tools for post-exploitation makes detection of ongoing activity difficult without proper baselining and monitoring.
Security teams should proactively hunt for the following indicators:
| Type | Value | Description |
|---|---|---|
| Log Pattern | HTTP requests from external IPs with Host: localhost header |
Indicates an attempt to bypass authentication. Check web server and firewall logs. |
| Account Creation | New administrator accounts, especially with names like Cluster Admin |
Audit user accounts within the Triofox platform for any unauthorized additions. |
| Configuration Change | Modification of the antivirus engine path in Triofox settings | Monitor configuration files or audit logs for changes pointing the AV engine to a script (.bat, .ps1, .sh). |
| Process Execution | Anomalous child processes spawned by the Triofox server process | Monitor for processes like cmd.exe or powershell.exe being launched by the Triofox application service, especially if they execute scripts from upload directories. |
| Network Traffic | Outbound connections related to Zoho UEMS, AnyDesk, or SSH tunnels on non-standard ports | Monitor egress traffic for connections to known C2 infrastructure associated with these tools. |
Detection Strategies:
Host header is localhost or 127.0.0.1. Correlate this with subsequent administrative activity.Response Actions:
16.7.10368.56560 or later). Consider rebuilding the server from a known-good state before restoring data from backups.16.7.10368.56560 or newer, which remediates this vulnerability.Host headers.Applying the patch from Gladinet (version 16.7.10368.56560 or newer) is the most effective way to prevent exploitation of this vulnerability.
Regularly audit administrative accounts and system configurations to detect unauthorized changes, such as the creation of rogue accounts or modification of the AV engine path.
Implement strict policies for account creation and privilege assignment. Monitor for the creation of new administrative accounts.
Use a Web Application Firewall (WAF) to inspect and filter incoming HTTP traffic, potentially blocking malformed requests like those with a spoofed Host header.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats