Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257 | POC Details |
| 2 | FortiWeb CVE-2025-25257 exploit | https://github.com/0xbigshaq/CVE-2025-25257 | POC Details |
| 3 | Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb. | https://github.com/adilburaksen/CVE-2025-25257-Exploit-Tool | POC Details |
| 4 | None | https://github.com/imbas007/CVE-2025-25257 | POC Details |
| 5 | CVE-2025-25257 | https://github.com/B1ack4sh/Blackash-CVE-2025-25257 | POC Details |
| 6 | PoC for CVE-2025-25257, a critical unauthenticated SQL injection in FortiWeb. Exploits SQLi via the Authorization header to write a webshell and gain RCE. No login required. Fully automated. | https://github.com/0xgh057r3c0n/CVE-2025-25257 | POC Details |
| 7 | Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure pre-authenticated SQL injection. | https://github.com/aitorfirm/CVE-2025-25257 | POC Details |
| 8 | CVE‑2025‑25257 is a critical pre-authentication SQL injection vulnerability affecting Fortinet FortiWeb’s | https://github.com/mrmtwoj/CVE-2025-25257 | POC Details |
| 9 | Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE | https://github.com/TheStingR/CVE-2025-25257 | POC Details |
| 10 | An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiWeb may allow an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPS requests. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-25257.yaml | POC Details |
| 11 | A working (at least for me :] ) exploit for CVE-2025-25257 | https://github.com/segfault-it/CVE-2025-25257 | POC Details |
| 12 | 🛠️ Exploit CVE-2025-25257 in FortiWeb with a working full exploit and a proof of concept for file read/write. | https://github.com/kityzed2003/CVE-2025-25257 | POC Details |
| 13 | PoC for CVE-2025-25257, a critical unauthenticated SQL injection in FortiWeb. Exploits SQLi via the Authorization header to write a webshell and gain RCE. No login required. Fully automated. | https://github.com/zr1p3r/CVE-2025-25257 | POC Details |
| 14 | None | https://github.com/silentexploitexe/CVE-2025-25257 | POC Details |
| 15 | CVE-2025-25257 PoC for educational use and/or authorised pentesting. | https://github.com/mr-r3b00t/CVE-2025-25257 | POC Details |
| 16 | CVE-2025-25257 | https://github.com/Ashwesker/Blackash-CVE-2025-25257 | POC Details |
| 17 | None | https://github.com/lytianahkone-boop/cve-2025-25257 | POC Details |
| 18 | CVE-2025-25257 | https://github.com/Ashwesker/Ashwesker-CVE-2025-25257 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet