Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Fortinet | Fortinet FortiOS, FortiProxy, FortiSwitchManager | FortiOS 7.2.1, 7.2.0, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0; FortiProxy 7.2.0, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0; FortiSwitchManager 7.2.0, 7.0.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager | https://github.com/horizon3ai/CVE-2022-40684 | POC Details |
| 2 | PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only) | https://github.com/carlosevieira/CVE-2022-40684 | POC Details |
| 3 | Bash PoC for Fortinet Auth Bypass - CVE-2022-40684 | https://github.com/Filiplain/Fortinet-PoC-Auth-Bypass | POC Details |
| 4 | Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager | https://github.com/kljunowsky/CVE-2022-40684-POC | POC Details |
| 5 | None | https://github.com/secunnix/CVE-2022-40684 | POC Details |
| 6 | None | https://github.com/iveresk/CVE-2022-40684 | POC Details |
| 7 | None | https://github.com/mhd108/CVE-2022-40684 | POC Details |
| 8 | exploit for CVE-2022-40684 Fortinet | https://github.com/ClickCyber/cve-2022-40684 | POC Details |
| 9 | Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ] | https://github.com/Chocapikk/CVE-2022-40684 | POC Details |
| 10 | Exploit for CVE-2022-40684 vulnerability | https://github.com/mohamedbenchikh/CVE-2022-40684 | POC Details |
| 11 | Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ] | https://github.com/HAWA771/CVE-2022-40684 | POC Details |
| 12 | None | https://github.com/NeriaBasha/CVE-2022-40684 | POC Details |
| 13 | Forti CVE-2022-40684 enumeration script built in Rust | https://github.com/Grapphy/fortipwn | POC Details |
| 14 | None | https://github.com/puckiestyle/CVE-2022-40684 | POC Details |
| 15 | None | https://github.com/jsongmax/Fortinet-CVE-2022-40684 | POC Details |
| 16 | Utilities for exploiting vulnerability CVE-2022-40684 (FortiOS / FortiProxy / FortiSwitchManager - Authentication bypass on administrative interface). | https://github.com/und3sc0n0c1d0/CVE-2022-40684 | POC Details |
| 17 | None | https://github.com/qingsiweisan/CVE-2022-40684 | POC Details |
| 18 | An authentication bypass using an alternate path or channel in Fortinet product | https://github.com/TaroballzChen/CVE-2022-40684-metasploit-scanner | POC Details |
| 19 | Exploit Fortigate - CVE-2022-40684 | https://github.com/gustavorobertux/gotigate | POC Details |
| 20 | None | https://github.com/hughink/CVE-2022-40684 | POC Details |
| 21 | None | https://github.com/notareaperbutDR34P3r/CVE-2022-40684-Rust | POC Details |
| 22 | 一键枚举所有用户名以及写入SSH公钥 | https://github.com/z-bool/CVE-2022-40684 | POC Details |
| 23 | None | https://github.com/Anthony1500/CVE-2022-40684 | POC Details |
| 24 | Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group | https://github.com/arsolutioner/fortigate-belsen-leak | POC Details |
| 25 | None | https://github.com/Rofell0s/Fortigate-Leak-CVE-2022-40684 | POC Details |
| 26 | Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group | https://github.com/AKboss1221/fortigate-belsen-leak | POC Details |
| 27 | None | https://github.com/XalfiE/Fortigate-Belsen-Leak-Dump-CVE-2022-40684- | POC Details |
| 28 | This repository contains informaion about the Fortigate firewall vulnerability (CVE-2022-40684) and affected data that were publicly disclosed by the Belsen Group. This information is being shared for security research and defensive purposes to help organizations identify if they were impacted. | https://github.com/niklasmato/fortileak-01-2025-Be | POC Details |
| 29 | None | https://github.com/Yami0x777/Belsen_Group-et-exploitation-de-la-CVE-2022-40684 | POC Details |
| 30 | Fortinet contains an authentication bypass vulnerability via using an alternate path or channel in FortiOS 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy 7.2.0 and 7.0.0 through 7.0.6, and FortiSwitchManager 7.2.0 and 7.0.0. An attacker can perform operations on the administrative interface via specially crafted HTTP or HTTPS requests, thus making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-40684.yaml | POC Details |
| 31 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/Fortinet%20FortiOS%20admin%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-40684.md | POC Details |
| 32 | Exploit for CVE-2022-40684 vulnerability | https://github.com/dkstar11q/CVE-2022-40684 | POC Details |
| 33 | Forti CVE-2022-40684 enumeration script built in Rust | https://github.com/xtwip/fortipwn | POC Details |
| 34 | PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only) | https://github.com/ccordeiro/CVE-2022-40684 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet