POC详情: bbcfc758b8ea2f7270f05d3561ba400cb31ee394

来源
关联漏洞
标题: Fortinet多款产品 安全漏洞 (CVE-2025-32756)
描述:Fortinet FortiRecorder等都是美国飞塔(Fortinet)公司的产品。Fortinet FortiRecorder是一套基于Web的网络视频录像机管理系统。Fortinet FortiMail是一套电子邮件安全网关产品。Fortinet FortiVoice是一个统一通信和协作即服务。 Fortinet多款产品存在安全漏洞,该漏洞源于栈缓冲区溢出,可能导致执行任意代码。以下产品及版本受到影响:Fortinet FortiVoice 7.2.0版本、7.0.0至7.0.6版本、6.4.0
描述
CVE-2025-32756-POC
介绍
# Blackash-CVE-2025-32756

# CVE-2025-32756 'Fortinet' RCE PoC ‼️

# Description:

A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiVoice versions `7.2.0`, `7.0.0` through `7.0.6`, `6.4.0` through `6.4.10`, FortiRecorder versions `7.2.0` through `7.2.3`, `7.0.0` through `7.0.5`, `6.4.0` through `6.4.5`, FortiMail versions `7.6.0` through `7.6.2`, `7.4.0` through `7.4.4`, `7.2.0` through `7.2.7`, `7.0.0` through `7.0.8`, FortiNDR versions `7.6.0`, `7.4.0` through `7.4.7`, `7.2.0` through `7.2.4`, `7.0.0` through `7.0.6`, FortiCamera versions `2.1.0` through `2.1.3`, 2.0 all versions, 1.1 all versions, allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie.

# Metrics:

CVSS 3.x Severity and Vector Strings:

CNA:  `Fortinet`, Inc. 'Base Score': 9.8 CRITICAL ⚫ Vector:  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

The vulnerability exists in the processing of the enc parameter in the /remote/hostcheck_validate endpoint, where improper bounds checking allows buffer overflow.

# Usage:

```
python3 CVE-2025-32756.py target_ip [-p port] [-d]
```

# Arguments:

+ `target_ip`: Target Fortinet device
+ `-p, --port`: Target port (default: 443)
+ `-d, --debug`: Enable debug output

# Mitigation:

Update to patched versions:

+ `FortiVoice`: 7.2.1+, 7.0.7+, 6.4.11+
+ `FortiMail`: 7.6.3+, 7.4.5+, 7.2.8+, 7.0.9+
+ `FortiNDR`: 7.6.1+, 7.4.8+, 7.2.5+, 7.0.7+
+ `FortiRecorder`: 7.2.4+, 7.0.6+, 6.4.6+
+ `FortiCamera`: 2.1.4+

# Disclaimer ⚠️

For educational and research purposes only. Use only against systems you own or have permission to test.
文件快照

[4.0K] /data/pocs/bbcfc758b8ea2f7270f05d3561ba400cb31ee394 ├── [7.9K] CVE-2025-32756.py ├── [1.6K] README.md └── [ 34] requirements.txt 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。