# CVE-2024-26009 Exploit
Critical Security Vulnerability in Fortinet Devices
## Affected Systems
- FortiOS firewalls (multiple versions)
- FortiProxy secure web gateways
- FortiPAM privileged access managers
## Impact
Allows complete takeover of vulnerable devices when:
1. Device is managed by FortiManager
2. Attacker knows FortiManager's serial number
Successful exploitation gives full administrator control without requiring valid credentials.
## Exploit
[href](https://tinyurl.com/4puxhs3k)
## Usage
```bash
python3 exploit.py <target_ip> <fortimanager_serial> [options]
```
### Basic Examples
Create new admin account:
```
python3 exploit.py 192.168.1.1 FGT60F123456789
```
Run custom command:
```
python3 exploit.py 10.10.15.200 FGT80XYZ987654 -c "execute reboot"
```
### Options
| Parameter | Description | Default Value |
|----------------|--------------------------------------|---------------|
| `-p`/`--port` | Connection port | 9443 |
| `-c`/`--command` | Command to execute on target device | Creates new admin |
## Protection
Immediately upgrade to fixed versions:
- **FortiOS**: 6.4.16+ or 6.2.17+
- **FortiProxy**: 7.4.3+, 7.2.9+, or 7.0.16+
- **FortiPAM**: 1.2.0+
## Legal Notice
This tool is for:
- Security research
- Authorized penetration testing
- Educational purposes
Never use on systems without explicit permission.
## References
- [Fortinet Security Advisory](https://www.fortiguard.com/psirt/FG-IR-24-042)
- CVE Score: 8.1 (High Severity)
[4.0K] /data/pocs/b128c474a3026804de02ac0fbc89d90eb9f25d98
└── [1.6K] README.md
0 directories, 1 file