Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Metasploit Adds Exploit Module for Recently Disclosed FortiWeb 0-Day Vulnerabilities

Metasploit Adds Exploit Module for Recently Disclosed FortiWeb 0-Day Vulnerabilities

Posted on November 22, 2025November 22, 2025 By CWS

The Metasploit Framework has launched a brand new exploit module concentrating on vital vulnerabilities in Fortinet’s FortiWeb Net Software Firewall (WAF).

This module chains two not too long ago disclosed flaws, CVE-2025-64446 and CVE-2025-58034, to attain unauthenticated Distant Code Execution (RCE) with root privileges.

The discharge follows studies of lively exploitation within the wild, together with “silent patches” and subsequent bypasses which have left many home equipment uncovered.

The Exploitation Chain

The brand new module, recognized as exploit/linux/http/fortinet_fortiweb_rce, automates a classy assault chain that bypasses authentication mechanisms earlier than executing arbitrary working system instructions.

The assault begins with CVE-2025-64446, a vital authentication bypass vulnerability with a CVSS rating of 9.1. As analyzed by researchers at watchTowr, this flaw entails a path traversal problem mixed with improper dealing with of the CGIINFO header.

By manipulating this header and traversing to the fwbcgi executable, an unauthenticated attacker can impersonate the built-in admin person and create a brand new administrative account with out legitimate credentials.

As soon as administrative entry is established, the module leverages CVE-2025-58034 to compromise the underlying system. This second vulnerability is an authenticated command injection flaw discovered within the FortiWeb API and CLI, the place particular components in OS instructions aren’t correctly neutralized.

Rapid7 evaluation confirms that this flaw permits an authenticated person to flee the supposed shell restrictions and execute instructions as the basis person. By chaining these two points, the Metasploit module permits an exterior attacker to go from zero entry to full system management in seconds.

The Metasploit module is designed to be versatile throughout totally different assault situations. In its default mode, it routinely exploits the authentication bypass (CVE-2025-64446) to provision a random administrator account.

It then authenticates with these new credentials to set off the command injection. Alternatively, if an attacker already possesses legitimate credentials, the module may be configured to skip the bypass section and immediately exploit CVE-2025-58034.

Technically, the exploit makes use of a chunked add mechanism to ship its payload. As seen within the pull request documentation, the module uploads a “bootstrap payload” in a number of components (e.g., 4 chunks) earlier than amalgamating and executing them.

This methodology ensures dependable execution even throughout the constrained atmosphere of the equipment. Profitable exploitation grants a shell with uid=0(root), giving the attacker full management over the WAF machine.

Fortinet has launched patches to deal with these vulnerabilities, and customers are strongly suggested to improve to FortiWeb model 8.0.2 or later instantly.

As a result of CVE-2025-64446 permits for the silent creation of rogue directors, merely patching is inadequate for doubtlessly compromised gadgets. Safety groups ought to audit their person lists for unknown accounts and evaluate logs for requests to /api/v2.0/cmdb/system/admin originating from untrusted IP addresses.

CVE IDVulnerability TypeCVSSAffected Merchandise (Partial Listing)CVE-2025-64446Auth Bypass / Path Traversal9.1FortiWeb 7.4.0-7.4.4, 7.6.0-7.6.4, 8.0.0-8.0.1CVE-2025-58034OS Command Injection7.2FortiWeb 8.0.0-8.0.1

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, Adds, Disclosed, Exploit, FortiWeb, Metasploit, Module, Vulnerabilities

Post navigation

Previous Post: Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination
Next Post: CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability

Related Posts

Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System Cyber Security News
Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication and Upload Malicious Files Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication and Upload Malicious Files Cyber Security News
Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code Cyber Security News
Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help Cyber Security News
New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers Cyber Security News
From SOC to SOAR Automating Security Operations From SOC to SOAR Automating Security Operations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark