A working (at least for me :] ) exploit for CVE-2025-25257# CVE-2025-25257
Exploits for CVE-2025-25257 released by watchtowr and others I found on github did not work on my installations of fortiweb
downloaded from the official vendor website. I ripped some of these exploit codes to make a poc capable to pop a reverse shell
on my environment. IP address and port of the reverse shell are hardcoded and must be changed ofc.
Exploit analysis and walkthough have been described in a two-part videos in my youtube channel (ITA language, ENG subtitles):
- Part 1: https://youtu.be/Z6I4adGuJ1c
- Part 2: https://youtu.be/Z6I4adGuJ1c
[4.0K] /data/pocs/743796bb6a8fc17b0818000a2e12c9c7c661de93
├── [ 573] README.md
└── [3.3K] watchtowel.py
0 directories, 2 files