Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Former Tesla product manager wants to make luxury goods impossible to fake, starting with a chip

    Volvo Group North America customer data exposed in Conduent hack

    Microsoft rolls out new Secure Boot certificates before June expiration

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      Bernstein Discusses Bitcoin’s Weakest Bear Market Yet – “Nothing Broke”

      February 9, 2026

      Ethereum Price Hits Breakdown Target — But Is a Bigger Drop to $1,000 Coming?

      February 9, 2026

      Damex Secures MiCA CASP Licence, Establishing Its Position as a Tier-1 Digital Asset Institution in Europe

      February 9, 2026

      Bitget and BlockSec Introduce the UEX Security Standard, Setting a New Benchmark for Universal Exchanges

      February 9, 2026

      3 Meme Coins To Watch In The Second Week Of February 2026

      February 9, 2026
    • Technology

      Volvo Group North America customer data exposed in Conduent hack

      February 10, 2026

      Microsoft rolls out new Secure Boot certificates before June expiration

      February 10, 2026

      Microsoft 365 outage takes down admin center in North America

      February 10, 2026

      How to Automate AWS Incident Investigation with Tines and AI

      February 10, 2026

      Microsoft announces new mobile-style Windows security controls

      February 10, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Fortinet FortiWeb flaw with public PoC exploited to create admin users
    Technology

    Fortinet FortiWeb flaw with public PoC exploited to create admin users

    TechAiVerseBy TechAiVerseNovember 14, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Fortinet FortiWeb flaw with public PoC exploited to create admin users
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Fortinet FortiWeb flaw with public PoC exploited to create admin users

    A Fortinet FortiWeb path traversal vulnerability is being actively exploited to create new administrative users on exposed devices without requiring authentication.

    The issue is fixed in FortiWeb 8.0.2, and admins are urged to update as soon as possible and check for signs of unauthorized access

    The exploitation was first spotted by threat intelligence company Defused on October 6, which reported an “Unknown Fortinet exploit” used against exposed devices to create admin accounts.

    Since then, attacks have increased, with threat actors now spraying the exploit globally.

    According to new research published by Daniel Card of PwnDefend and Defused, the flaw is a path traversal issue affecting the following Fortinet endpoint:

    /api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi

    Threat actors are sending HTTP POST requests to this path containing payloads that create local admin-level accounts on the targeted device.

    The exploitation observed by researchers includes multiple sets of created username and password combinations, with usernames including Testpoint, trader1, and trader. Passwords seen assigned to accounts include 3eMIXX43, AFT3$tH4ck, and AFT3$tH4ckmet0d4yaga!n.

    The attacks originated from a wide range of IP addresses, including:

    • 107.152.41.19
    • 144.31.1.63
    • Addresses in the 185.192.70.0/24 range
    • 64.95.13.8 (from original October report)

    Security researchers at watchTowr Labs have confirmed the exploit, posting a video on X that demonstrates a failed FortiWeb login attempt, the execution of the exploit, and the successful login as the newly created admin user.

    watchTowr also released a tool called “FortiWeb Authentication Bypass Artifact Generator,” which attempts to exploit the flaw by creating an admin user with an 8-character random username derived from a UUID.

    The tool was released to help defenders identify vulnerable devices.

    According to Rapid7, which tested the exploit across multiple versions, the flaw affects FortiWeb versions 8.0.1 and earlier. The flaw was fixed in version 8.0.2, which is believed to have been released at the end of October.

    However, BleepingComputer has been unable to find any disclosure of a FortiWeb vulnerability on Fortinet’s PSIRT site that matches the one being exploited.

    BleepingComputer contacted Fortinet with questions about this reported exploitation and will update our story when we receive a response.

    As the vulnerability appears to be actively exploited in the wild, administrators should review their devices for unusual administrative accounts, check logs for requests to the fwbcgi path, and investigate any activity from the identified suspicious IP addresses.

    Administrators should also ensure these management interfaces are not reachable from the internet and are restricted to trusted networks or VPN-only access.


    Secrets Security Cheat Sheet: From Sprawl to Control

    Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

    Get the cheat sheet and take the guesswork out of secrets management.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleKraken ransomware benchmarks systems for optimal encryption choice
    Next Article DoorDash hit by new data breach in October exposing user information
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Volvo Group North America customer data exposed in Conduent hack

    February 10, 2026

    Microsoft rolls out new Secure Boot certificates before June expiration

    February 10, 2026

    Microsoft 365 outage takes down admin center in North America

    February 10, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025662 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025250 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025149 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Software and Apps February 10, 2026

    Former Tesla product manager wants to make luxury goods impossible to fake, starting with a chip

    Former Tesla product manager wants to make luxury goods impossible to fake, starting with a…

    Volvo Group North America customer data exposed in Conduent hack

    Microsoft rolls out new Secure Boot certificates before June expiration

    Microsoft 365 outage takes down admin center in North America

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Former Tesla product manager wants to make luxury goods impossible to fake, starting with a chip

    February 10, 20263 Views

    Volvo Group North America customer data exposed in Conduent hack

    February 10, 20263 Views

    Microsoft rolls out new Secure Boot certificates before June expiration

    February 10, 20263 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.