PT-2025-46160 · Triofox · Triofox
Published
2025-11-10
·
Updated
2025-12-19
·
CVE-2025-12480
CVSS v3.1
9.4
9.4
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
Name of the Vulnerable Software and Affected Versions
Triofox versions prior to 16.7.10368.56560
Description
Triofox is vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete. This vulnerability, designated CVE-2025-12480, allows attackers to bypass authentication and gain access to the application’s configuration pages. Attackers have been observed exploiting this flaw, including the UNC6485 threat cluster, to install remote access tools via the antivirus feature. The exploitation involves manipulating the HTTP Host header to gain unauthorized access and then leveraging the antivirus functionality to execute arbitrary code with SYSTEM-level privileges. Attackers have been observed deploying tools such as PLINK, Zoho Assist, and AnyDesk. The vulnerability was actively exploited as early as August 24, 2025, shortly after a patch was released in July 2025.
Recommendations
Upgrade Triofox to version 16.7.10368.56560.
Audit existing admin accounts.
Verify that the antivirus feature is not configured to execute unauthorized scripts.
Exploit
Fix
RCE
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-14010
CVE-2025-12480
TRIOFOXCVE2025_12480
Affected Products
Triofox
References · 100
- 🔥 https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480 · Exploit
- https://bdu.fstec.ru/vul/2025-14010 · Security Note
- https://access.triofox.com/releases_history · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-12480 · Security Note
- https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md⭐ 211 🔗 68 · Note
- https://t.me/true_secator/7615 · Telegram Post
- https://twitter.com/kiranhunter/status/1988585895562473651 · Twitter Post
- https://twitter.com/freedomhack101/status/1988261298715717800 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1ouevqu/cve202512480_detection_hackers_exploit_the · Reddit Post
- https://twitter.com/Dinosn/status/1988135332764876896 · Twitter Post
- https://twitter.com/Horizon3ai/status/1989019108285825095 · Twitter Post
- https://twitter.com/RedLegg/status/1988736573555237331 · Twitter Post
- https://securitylab.ru/news/565967.php · Note
- https://twitter.com/TechNadu/status/1988215287934796209 · Twitter Post
- https://twitter.com/gothburz/status/1988481618093252673 · Twitter Post