CVE-2024-55591 Opening CMD (Command Line Interface), Creating a Superuser, and Managing VPN Groups# CVE-2024-55591
### If you're reading this, you most likely know what we're talking about.
[DOWNLOAD](https://satoshidisk.com/pay/CNVBUk)
# Vulnerability Scanner
## Description
This script attempts to create a WebSocket connection at a random URI from a pre-authenticated perspective to the FortiOS management interface, and reviews the response to determine if the instance is VULNERABLE.
### Checks the file with ip addresses for vulnerability
## USEAGE
Checks your text document with ip addresses for vulnerabilities
```python check.py --file ips.txt --port 443```
# poc.py
## Description
Use this poc, you can bypass authentication and see system log.
## USAGE
```python3 poc.py [-h] --target TARGET [--port PORT]```
# ADMIN CREATION
## Description
Use this exp, you can Сreates administrator, adding an administrator to a VPN group.
## USEAGE
Set the required IP Address in the code before startup.

```python3 adadmin.py```

# CMD
## Description
Use this exp, you can bypass authentication and run cmd.
## USEAGE
```exp.py [-h] --target TARGET [--port PORT] [--username USERNAME] [--cmd CMD]```
## Affected Versions
-FortiOS 7.0.0 through 7.0.16
-FortiProxy 7.0.0 through 7.0.19
-FortiProxy 7.2.0 through 7.2.12
[More details](https://www.fortiguard.com/psirt/FG-IR-24-535)
[DOWNLOAD](https://satoshidisk.com/pay/CNVBUk)
[4.0K] /data/pocs/a2f5ff10c5cd8a24f9e52e8ed8b7acbe14adf8b0
├── [5.5K] check.py
├── [7.9K] poc.py
└── [1.5K] README.md
0 directories, 3 files