PT-2025-46160 · Triofox · Triofox
Published
2025-11-10
·
Updated
2025-11-12
·
CVE-2025-12480
CVSS v3.1
9.1
9.1
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
Name of the Vulnerable Software and Affected Versions
Triofox versions prior to 16.7.10368.56560
CentreStack versions prior to 12.10.59
Description
Triofox and CentreStack are vulnerable to an Improper Access Control flaw that allows unauthenticated attackers to gain access to application configuration pages. This allows for the upload and execution of arbitrary payloads on the server. The vulnerability, designated CVE-2025-12480, is actively being exploited by the UNC6485 threat group. Attackers are chaining this flaw with the Triofox built-in antivirus scanning feature to achieve remote code execution (RCE). Specifically, attackers create an administrative account and configure the antivirus path to execute malicious scripts, such as
centre report.bat, with SYSTEM-level privileges. This enables the deployment of remote access tools like Zoho Assist, AnyDesk, and Plink for persistent access and reconnaissance. The exploitation involves renaming executable files (e.g., sihosts.exe, silcon.exe) to evade detection and establishing SSH tunnels. The initial access is gained through a host header bypass, allowing attackers to bypass authentication.Recommendations
Update to Triofox version 16.7.10368.56560.
Update to CentreStack version 12.10.59.
Audit existing admin accounts.
Verify that the antivirus feature is not configured to execute unauthorized scripts.
Monitor outbound SSH traffic for suspicious activity.
Implement hunting queries to detect artifacts associated with this attack methodology.
Fix
RCE
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2025-12480
Affected Products
Triofox
References · 67
- https://nvd.nist.gov/vuln/detail/CVE-2025-12480 · Security Note
- https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md⭐ 211 🔗 68 · Note
- https://reddit.com/r/SecOpsDaily/comments/1ouevqu/cve202512480_detection_hackers_exploit_the · Reddit Post
- https://twitter.com/TweetThreatNews/status/1988252367297384816 · Twitter Post
- https://reddit.com/r/TechNadu/comments/1ou7u64/threat_actors_abuse_triofox_antivirus_feature_to · Reddit Post
- https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480 · Reddit Post
- https://reddit.com/r/SecOpsDaily/comments/1otrgbm/hackers_exploiting_triofox_flaw_to_install_remote · Reddit Post
- https://t.me/thehackernews/7875 · Telegram Post
- https://t.me/cveNotify/142308 · Telegram Post
- https://reddit.com/r/KibernetinisSaugumas/comments/1ou6zkg/hakeriai_i%C5%A1naudoja_triofox_tr%C5%ABkum%C4%85 · Reddit Post
- https://twitter.com/IT_news_for_all/status/1987988711187882129 · Twitter Post
- https://twitter.com/AndreGironda/status/1987966295233753341 · Twitter Post
- https://twitter.com/MrsYisWhy/status/1987921342633537614 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1ou6n99/top_10_trending_cves_11112025 · Reddit Post
- https://twitter.com/cyashadotcom/status/1988240883008045368 · Twitter Post