Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 14 Nov 2025 00:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gladinet:triofox:*:*:*:*:*:*:*:* |
Thu, 13 Nov 2025 02:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Thu, 13 Nov 2025 00:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Wed, 12 Nov 2025 22:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gladinet
Gladinet triofox |
|
| Vendors & Products |
Gladinet
Gladinet triofox |
Tue, 11 Nov 2025 00:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 10 Nov 2025 23:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete. | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Mandiant
Published:
Updated: 2025-11-12T17:20:24.201Z
Reserved: 2025-10-29T16:41:20.748Z
Link: CVE-2025-12480
Updated: 2025-11-11T15:34:49.641Z
Status : Analyzed
Published: 2025-11-10T15:15:36.527
Modified: 2025-11-14T02:00:02.350
Link: CVE-2025-12480
No data.
OpenCVE Enrichment
Updated: 2025-11-12T21:50:11Z