Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, as exploited in the wild in March 2025. This enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. NOTE: a CentreStack admin can manually delete the machineKey defined in portal\web.config.
https://www.cybereason.com/blog/ttp-briefing-q3-2025
https://www.securityweek.com/gladinet-patches-exploited-centrestack-vulnerability/
https://www.databreachtoday.com/hackers-exploit-lfi-flaw-in-file-sharing-platforms-a-29708
https://thehackernews.com/2025/10/from-lfi-to-rce-active-exploitation.html
https://www.huntress.com/blog/gladinet-centrestack-triofox-local-file-inclusion-flaw
https://www.darkreading.com/vulnerabilities-threats/sitecore-zero-day-viewstate-threats
https://thehackernews.com/2025/04/gladinets-triofox-and-centrestack-under.html
https://www.darkreading.com/vulnerabilities-threats/zero-day-centrestack-platform-under-attack
https://www.securityweek.com/cisa-urges-urgent-patching-for-exploited-centrestack-windows-zero-days/
https://thehackernews.com/2025/04/cisa-warns-of-centrestacks-hard-coded.html