Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-64446 PoC — Fortinet FortiWeb 安全漏洞

Source
Associated Vulnerability
Title:Fortinet FortiWeb 安全漏洞 (CVE-2025-64446)
Description:A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.
Readme
# CVE-2025-64446 Exploit Tool

Exploit tool for CVE-2025-64446 vulnerability verification and exploitation in FortiWeb devices.

## Description

This tool tests for and exploits a path traversal vulnerability (CVE-2025-64446) in FortiWeb web application firewalls. It can be used to verify vulnerability status or exploit the CGI endpoint to create/modify user accounts.

## Installation

```bash
pip install -r requirements.txt
```

## Usage

### Vulnerability Verification (Read-only)

```bash
python3 exploit.py -t <target_ip> --check
```

### Execute Exploit

```bash
python3 exploit.py -t <target_ip> --exploit
```

### Custom Parameters

```bash
python3 exploit.py -t <target_ip> --exploit --username sxy --password sxyrxyadmin1!
```

### Multiple Targets from File

```bash
python3 exploit.py -l targets.txt --check
```

Create a `targets.txt` file with one IP address per line:
```
192.168.1.100
192.168.1.101
192.168.1.102
```

## Options

- `-t, --target` - Target IP address (required if `--targets-file` not used)
- `-l, --targets-file` - File containing target IP addresses (one per line, required if `--target` not used)
- `-p, --port` - Target port (default: 443)
- `--http` - Use HTTP instead of HTTPS
- `--check` - Vulnerability verification only (read-only)
- `--exploit` - Execute CGI endpoint exploit
- `--username` - Username for exploit (default: sxy)
- `--password` - Password to set (default: sxyrxyadmin1!)
- `--profname` - Profile name (default: prof_admin)
- `--vdom` - VDOM name (default: root)
- `--loginname` - Login name (default: admin)
- `--testpoint-name` - Testpoint/user name to create (default: Testpoint)

## Disclaimer

This tool is for authorized security research and educational purposes only. Only use on systems you own or have explicit permission to test.

File Snapshot

[4.0K] /data/pocs/3cb3bd34eeaf7f9671758e7feb30e892a48128f7 ├── [ 16K] exploit.py ├── [1.8K] README.md └── [ 33] requirements.txt 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →