Share
## https://sploitus.com/exploit?id=B7C4C463-40C2-5718-8AF8-47384AFC82B0
<<<<<<< HEAD
# CVE-2024-55591-POC
=======

# CVE-2024-55591 โ€“ FortiOS WebSocket CLI Auth Bypass (PoC)

This is a Proof-of-Concept (PoC) tool for exploiting **CVE-2024-55591**, a vulnerability in FortiOS that allows unauthenticated access to the CLI over WebSocket.

## Features

- Automatic detection of FortiOS GUI and vulnerability status
- Execute arbitrary CLI commands via WebSocket
- Interactive shell interface
- Admin password reset functionality (`--reset-user`)
- SSL support

## Usage

### Basic interactive mode:

```bash
python3 poc.py --host <target_ip> --port 443 --ssl
```

Then use the prompt:

```
FortiOS# get system status
FortiOS# exit
```

### Reset admin password:

```bash
python3 poc.py --host <target_ip> --port 443 --ssl \
  --reset-user Admin2 --new-pass Forti2024!
```

## Developer

- Telegram: [@cherny_zhizn](https://t.me/cherny_zhizn)

---

**Disclaimer:** This tool is provided for educational and authorized testing purposes only.
>>>>>>> 4fe5de8 (Add full PoC and README for CVE-2024-55591 by @cherny_zhizn)