支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: a37b4437b122eb4e7545c2cd4fa717723c8d24d4

来源
关联漏洞
标题:Fortinet FortiSIEM 操作系统命令注入漏洞 (CVE-2025-25256)
Description:Fortinet FortiSIEM是美国飞塔(Fortinet)公司的一套安全信息和事件管理系统。该系统包括资产发现、工作流程自动化和统一管理等功能。 Fortinet FortiSIEM 7.3.0至7.3.1版本、7.2.0至7.2.5版本、7.1.0至7.1.7版本、7.0.0至7.0.3版本和6.7.9之前版本存在操作系统命令注入漏洞,该漏洞源于OS命令注入,可能导致执行任意代码。
Description
CVE-2025-25256: Fortinet FortiSIEM OS Command Injection CVE PoC (Proof of Concept)
介绍
# CVE-2025-25256 - Fortinet FortiSIEM Vulnerability

## Overview

This repository contains a proof-of-concept (POC) for a critical unauthenticated command injection security flaw (CVE-2025-25256) was recently identified in Fortinet FortiSIEM. The issue allows an attacker to remotely run commands on the system without logging in. The problem is tied to the phMonitor that listens on port 7900 and has been rated **9.8/10 in severity**.

## Impacted Versions

* FortiSIEM 6.1 – 6.6 (all versions)
* FortiSIEM 6.7.0 – 6.7.9
* FortiSIEM 7.0.0 – 7.0.3
* FortiSIEM 7.1.0 – 7.1.7
* FortiSIEM 7.2.0 – 7.2.5
* FortiSIEM 7.3.0 – 7.3.1

Fortinet has released fixed versions (7.3.2 and 7.4.0).

## Recommended Action

If you use FortiSIEM, you should ensure systems are upgraded to a patched version as soon as possible. Until then, limiting access to the affected service can reduce risk.

## Usage

```
python exploit.py -ip {ip} -port {port} -command "{cmd}"
```

Read thru the file for more info.



## Exploit
[Link](https://tinyurl.com/5n8hrhjm)


文件快照

[4.0K] /data/pocs/a37b4437b122eb4e7545c2cd4fa717723c8d24d4 └── [1.0K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。