Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-23113 PoC — Fortinet FortiOS 格式化字符串错误漏洞

Source
Associated Vulnerability
Title:Fortinet FortiOS 格式化字符串错误漏洞 (CVE-2024-23113)
Description:A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
Description
This python scripts searches a client list to see if their FortiGate device is vulnerable to this CVE.
Readme
# CVE-2024-23113
This python scripts searches a client list to see if their FortiGate device is vulnerable to this CVE.

## How To Use
1) Create a "clients.txt" file, and import a list of all your clients IP addresses.
2) Create a "vul.txt" file. This will be used to export the scripts findings.
3) Run scan-clients.py.

## Release of Liability
This python script is to be used for internal use only. It should only be used to scan your IP space or your client's IP space. Any abuse of this script is not the responsibility of the writer or it's associates.
File Snapshot

[4.0K] /data/pocs/d56e9ef1dfb2ac53acd6ef5687db18ca8a7d33e0 ├── [ 559] README.md └── [3.4K] scan-clients.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →