Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild

PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild

Posted on November 15, 2025November 15, 2025 By CWS

A proof-of-concept (PoC) exploit instrument for CVE-2025-64446 has been publicly launched on GitHub. This vulnerability, affecting FortiWeb units from Fortinet, includes a essential path traversal flaw that has already been noticed in real-world assaults, permitting unauthorized entry to delicate CGI endpoints.

Safety researchers warn that the instrument’s availability may speed up exploitation makes an attempt in opposition to unpatched techniques worldwide.​

CVE-2025-64446 targets FortiWeb’s net software firewall (WAF) element, enabling attackers to bypass entry controls and manipulate consumer accounts by listing traversal strategies.

Found earlier this yr, the flaw stems from improper enter validation within the CGI dealing with mechanism, allowing distant code execution in sure configurations.

In keeping with Fortinet’s advisory, affected variations vary from 6.3.0 to 7.4.6, with exploitation within the wild reported as early as October 2025 by risk intelligence companies monitoring darkish net boards and incident response logs.

The vulnerability’s severity is rated CVSS 9.8, indicating its potential to have a widespread influence on enterprises that depend on FortiWeb for net visitors safety.

The PoC, developed by GitHub consumer sxyrxyy and shared underneath the repository “CVE-2025-64446-FortiWeb-CGI-Bypass-PoC,” gives an easy Python-based script for testing and exploiting the flaw.

Designed for approved safety testing, the instrument requires minimal setup: customers merely set up dependencies by way of “pip set up -r necessities.txt” earlier than operating the exploit script.

For vulnerability verification, the command “python3 exploit.py -t –test” probes the goal with out inflicting hurt, confirming if the system is inclined to traversal assaults.

In exploit mode, “python3 exploit.py -t –exploit” leverages the CGI endpoint to create or modify administrative consumer accounts, defaulting to a username “sxy” and password “sxyrxyadmin1!”.​

Superior choices improve the instrument’s flexibility for penetration testers. Customized parameters enable specifying usernames, passwords, profile names (default: prof_admin), VDOM cases (default: root), and login names (default: admin).

For batch operations, the script helps loading a number of targets from a file like targets.txt, enabling scans throughout IP ranges comparable to 192.168.1.100 to 192.168.1.102.

Port customization defaults to 443 for HTTPS, however the “–http” flag switches to unencrypted visitors, and the “–testpoint-name” possibility units a default consumer creation identify of “Testpoint”.​

Consultants emphasize the instrument’s dual-edged nature: whereas invaluable for defensive assessments, its public launch amplifies threats to outdated FortiWeb deployments in sectors like finance and healthcare.

Fortinet urges fast patching to model 7.4.7 or later, alongside community segmentation to mitigate lateral motion dangers. The repository’s disclaimer stresses use solely on owned or permitted techniques, aligning with accountable disclosure norms.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Exploit, Exploited, FortiWeb, PoC, Released, Tool, Vulnerability, WAF, Wild

Post navigation

Previous Post: Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers
Next Post: Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges

Related Posts

Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day Cyber Security News
Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks Cyber Security News
MastaStealer Weaponizes Windows LNK Files, Executes PowerShell Command, and Evades Defender MastaStealer Weaponizes Windows LNK Files, Executes PowerShell Command, and Evades Defender Cyber Security News
Critical Axios Flaw Allows Node.js Server Crashes Critical Axios Flaw Allows Node.js Server Crashes Cyber Security News
48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild 48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild Cyber Security News
PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark