This is a heavily interactive web application, and JavaScript is required. Simple HTML interfaces are possible, but that is not what this is.
Post
Huntress
huntress.com
did:plc:p6o63ounxgmsrbibzrj6n33n
➕Threat actors continue to target this flaw with 24 different orgs now compromised
➕We observed several organizations targeted on April 21 in attacks that used several overlapping ping commands
We’ll continue giving updates on this exploit as we gather more details: https://www.huntress.com/blog/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild
2025-04-22T13:07:46.412Z