Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-52970 PoC — Fortinet FortiWeb 安全漏洞

Source
Associated Vulnerability
Title:Fortinet FortiWeb 安全漏洞 (CVE-2025-52970)
Description:Fortinet FortiWeb是美国飞塔(Fortinet)公司的一款Web应用层防火墙,它能够阻断如跨站点脚本、SQL注入、Cookie中毒、schema中毒等攻击的威胁,保证Web应用程序的安全性并保护敏感的数据库内容。 Fortinet FortiWeb 7.6.3及之前版本、7.4.7及之前版本、7.2.10及之前版本和7.0.10及之前版本存在安全漏洞,该漏洞源于参数处理不当,可能导致权限提升。
Description
 CVE-2025-52970 - FortiWeb Authentication Bypass to Remote Code Execution Exploit 
Readme
# CVE-2025-52970
FortiWeb Authentication Bypass to Remote Code Execution Exploit 

# Features

- [X] Weaponized by adding interactive shell to enable remote code execution

# Usage
```bash
python CVE-2025-52970.py -t target.com
```

# Demo

<img width="717" height="951" alt="image" src="https://github.com/user-attachments/assets/9e33eaa6-f6fc-44be-bded-ef305c9ade4b" />

# References

https://github.com/Hex00-0x4/FortiWeb-CVE-2025-52970-Authentication-Bypass


# Disclaimer

This proof of concept is for educational purposes only, I'm not responsible for any bad uses.
File Snapshot

[4.0K] /data/pocs/30b9f315d46242a81fad12b94d886158ab35ea2d ├── [5.3K] CVE-2025-52970.py └── [ 572] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.