Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-25257 PoC — Fortinet FortiWeb SQL注入漏洞

Source
Associated Vulnerability
Title:Fortinet FortiWeb SQL注入漏洞 (CVE-2025-25257)
Description:Fortinet FortiWeb是美国飞塔(Fortinet)公司的一款Web应用层防火墙,它能够阻断如跨站点脚本、SQL注入、Cookie中毒、schema中毒等攻击的威胁,保证Web应用程序的安全性并保护敏感的数据库内容。 Fortinet FortiWeb 7.6.3及之前版本、7.4.7及之前版本、7.2.10及之前版本和7.0.10之前版本存在SQL注入漏洞,该漏洞源于对SQL命令中特殊元素中和不当,可能导致SQL注入攻击。
Description
Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb.
Readme
# CVE-2025-25257 Exploit Tool

Credits
```
Based on watchTowr Labs, 0xbigshaq, and pwner.gg analyses.
````

Warnings
````
For educational purposes only. Use on authorized systems. Modifies database/filesystem.
````
Enhanced Python tool for detecting and exploiting CVE-2025-25257 (Pre-Auth SQLi to RCE in Fortinet FortiWeb).

## Features
- Vulnerability detection with version checking.
- Persistent webshell upload via SQL injection.
- Payload splitting and hex encoding for length limits.
- Chmod gadget with cleanup.
- CGI trigger for RCE.

## Usage
```bash
python exploit.py --host target.com --https --exploit
--host: Target host.
--https: Use HTTPS.
--exploit: Perform exploit if vulnerable.

Installation
pip install -r requirements.txt
File Snapshot

[4.0K] /data/pocs/97cf1723be8eff971506beff93dd319fdc04637d ├── [6.7K] exploit.py ├── [1.0K] LICENSE └── [ 744] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.