CVE-2025–64446 — A Red Team Offensive Playbook for FortiWeb RCE via Path Traversal + Authentication
1. Recon
Goal: Identify FortiWeb appliances exposed online
Fofa Query
Why recon matters
2. Fingerprinting
Goal: Confirm the device is FortiWeb (not FortiGate, FortiProxy, etc.)
Banner grabbing
Fingerprint Indicators
3. Version Detection
Goal: Determine if the appliance is within the vulnerable version ranges.
Affected Versions (Based on NVD, vendor advisories)
Version Endpoint Probe
4. Attack Method 1: Path Traversal
Goal: Break out of API routing and reach internal CGI.
Key observations
Result
5. Attack Method 2: CGIINFO Manipulation
Goal: Forge an internal authentication identity
What the JSON looks like
Your exploit turns this into:
6. Attack Method 3: Admin User Injection (The Exploit)
Goal: Create a new admin user using forged privileges.
🔥 Full Exploit PoC (Python)
Last updated