CVE-2025-12480 is a critical access control vulnerability in Gladinet Triofox (CVSS 9.1) that allows attackers to access setup pages. Patch immediately.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| triofox | * | 16.7.10368.56560 | vulnerable |
Download and apply the latest security updates from Gladinet to resolve the improper access control flaw in the Triofox platform.
Upgrade all Triofox deployments to version 16.7.10368.56560 or later, as all previous versions are susceptible to this vulnerability.
Use firewalls or access control lists (ACLs) to ensure that administrative and setup interfaces are only accessible from internal, authorized management networks.
Audit web server logs for unexpected traffic to setup-related directories and monitor for unauthorized changes to system configuration settings.
Detecting exploitation of CVE-2025-12480 involves monitoring web server logs for inbound requests to setup or installation URIs (such as /setup or /install) from external sources. Look for successful HTTP 200 status codes on these paths post-deployment. Additionally, security teams should use network scanning tools to verify if sensitive configuration pages are exposed to the public internet.
Experience superior visibility and a simpler approach to cyber risk management