Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts

Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts

Posted on November 14, 2025November 14, 2025 By CWS

Nov 14, 2025Ravie LakshmananThreat Intelligence / Vulnerability
Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that would enable an attacker to take over admin accounts and utterly compromise a tool.
“The watchTowr staff is seeing energetic, indiscriminate in-the-wild exploitation of what seems to be a silently patched vulnerability in Fortinet’s FortiWeb product,” Benjamin Harris, watchTowr CEO and founder, stated in an announcement.
“Patched in model 8.0.2, the vulnerability permits attackers to carry out actions as a privileged consumer – with in-the-wild exploitation specializing in including a brand new administrator account as a fundamental persistence mechanism for the attackers.”

The cybersecurity firm stated it was capable of efficiently reproduce the vulnerability and create a working proof-of-concept (Poc). It has additionally launched an artifact generator software for the authentication bypass to assist determine inclined gadgets.
In line with particulars shared by Defused and safety researcher Daniel Card of PwnDefend, the risk actor behind the exploitation has been discovered to ship a payload to the “/api/v2.0/cmdb/system/adminpercent3F/../../../../../cgi-bin/fwbcgi” via an HTTP POST request to create an admin account.
Among the admin usernames and passwords created by the payloads detected within the wild are beneath –

Testpoint / AFodIUU3Sszp5
trader1 / 3eMIXX43
dealer / 3eMIXX43
test1234point / AFT3$tH4ck
Testpoint / AFT3$tH4ck
Testpoint / AFT3$tH4ckmet0d4yaga!n

The origins and identification of the risk actor behind the assaults stay unknown. The exploitation exercise was first detected early final month. As of writing, Fortinet has not assigned a CVE identifier or printed an advisory on its PSIRT feed.

The Hacker Information has reached out to Fortinet for remark, and we’ll replace the story if we hear again.
Rapid7, which is urging organizations working variations of Fortinet FortiWeb that predate 8.0.2 to deal with the vulnerability on an emergency foundation, stated it noticed an alleged zero-day exploit focusing on FortiWeb was printed on the market on a well-liked black hat discussion board on November 6, 2025. It is presently not clear if it is the identical exploit.
“Whereas we look forward to a remark from Fortinet, customers and enterprises at the moment are going through a well-recognized course of now: search for trivial indicators of prior compromise, attain out to Fortinet for extra data, and apply patches if you have not already,” Harris stated. “That stated, given the indiscriminate exploitation noticed […], home equipment that stay unpatched are probably already compromised.”

The Hacker News Tags:Accounts, Admin, Attacks, Create, Exploited, Flaw, Fortinet, FortiWeb, NowPatched

Post navigation

Previous Post: Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign
Next Post: Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover

Related Posts

DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams The Hacker News
251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch 251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch The Hacker News
Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks The Hacker News
Google Requires Crypto App Licenses in 15 Regions as FBI Warns of .9M Scam Losses Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses The Hacker News
Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access The Hacker News
ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News