Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/Hex00-0x4/FortiWeb-CVE-2025-52970-Authentication-Bypass | POC Details |
| 2 | CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit | https://github.com/34zY/CVE-2025-52970 | POC Details |
| 3 | None | https://github.com/imbas007/POC-CVE-2025-52970 | POC Details |
| 4 | A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-52970.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-25256 | 9.8 CRITICAL | Fortinet FortiSIEM 操作系统命令注入漏洞 |
| CVE-2024-26009 | 7.9 HIGH | Fortinet多款产品 安全漏洞 |
| CVE-2025-53744 | 6.8 MEDIUM | Fortinet FortiOS Security Fabric 安全漏洞 |
| CVE-2025-27759 | 6.7 MEDIUM | Fortinet FortiWeb 操作系统命令注入漏洞 |
| CVE-2025-49813 | 6.6 MEDIUM | Fortinet FortiADC 操作系统命令注入漏洞 |
| CVE-2025-47857 | 6.5 MEDIUM | Fortinet FortiWeb CLI 操作系统命令注入漏洞 |
| CVE-2024-48892 | 6.4 MEDIUM | Fortinet FortiSOAR 安全漏洞 |
| CVE-2023-45584 | 6.3 MEDIUM | Fortinet多款产品 资源管理错误漏洞 |
| CVE-2025-32766 | 6.3 MEDIUM | Fortinet FortiWeb CLI 安全漏洞 |
| CVE-2025-32932 | 6.2 MEDIUM | Fortinet FortiSOAR 跨站脚本漏洞 |
| CVE-2024-52964 | 5.2 MEDIUM | Fortinet FortiManager和Fortinet FortiManager Cloud 路径遍历漏洞 |
| CVE-2025-25248 | 4.8 MEDIUM | Fortinet多款产品 输入验证错误漏洞 |
| CVE-2024-40588 | 4.2 MEDIUM | Fortinet多款产品 安全漏洞 |
No comments yet