Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Fortinet | FortiSwitch | 7.6.0 | cpe:2.3:a:fortinet:fortiswitch:7.6.0:*:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | a lightweight JavaScript snippet showcasing how unauthorized password changes can be triggered on vulnerable Fortinet FortiSwitch GUI endpoints. | https://github.com/cybersecplayground/CVE-2024-48887-FortiSwitch-Exploit | POC Details |
| 2 | Unverified Password Change (CWE-620) | https://github.com/groshi215/CVE-2024-48887-Exploit | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-26013 | 7.1 HIGH | Fortinet多款产品 安全漏洞 |
| CVE-2024-54024 | 7.0 HIGH | Fortinet FortiIsolator 操作系统命令注入漏洞 |
| CVE-2025-25254 | 6.8 MEDIUM | Fortinet FortiWeb 路径遍历漏洞 |
| CVE-2023-37930 | 6.7 MEDIUM | Fortinet多款产品 安全漏洞 |
| CVE-2024-54025 | 6.5 MEDIUM | Fortinet FortiIsolator 操作系统命令注入漏洞 |
| CVE-2024-46671 | 5.6 MEDIUM | Fortinet FortiWeb 安全漏洞 |
| CVE-2024-52962 | 5.0 MEDIUM | Fortinet FortiAnalyzer 安全漏洞 |
| CVE-2024-50565 | 3.0 LOW | Fortinet多款产品 安全漏洞 |
| CVE-2025-22855 | 2.6 LOW | Fortinet FortiClient 跨站脚本漏洞 |
| CVE-2024-32122 | 2.1 LOW | Fortinet FortiOS 安全漏洞 |
No comments yet