## https://sploitus.com/exploit?id=B7C4C463-40C2-5718-8AF8-47384AFC82B0
<<<<<<< HEAD
# CVE-2024-55591-POC
=======
# CVE-2024-55591 โ FortiOS WebSocket CLI Auth Bypass (PoC)
This is a Proof-of-Concept (PoC) tool for exploiting **CVE-2024-55591**, a vulnerability in FortiOS that allows unauthenticated access to the CLI over WebSocket.
## Features
- Automatic detection of FortiOS GUI and vulnerability status
- Execute arbitrary CLI commands via WebSocket
- Interactive shell interface
- Admin password reset functionality (`--reset-user`)
- SSL support
## Usage
### Basic interactive mode:
```bash
python3 poc.py --host <target_ip> --port 443 --ssl
```
Then use the prompt:
```
FortiOS# get system status
FortiOS# exit
```
### Reset admin password:
```bash
python3 poc.py --host <target_ip> --port 443 --ssl \
--reset-user Admin2 --new-pass Forti2024!
```
## Developer
- Telegram: [@cherny_zhizn](https://t.me/cherny_zhizn)
---
**Disclaimer:** This tool is provided for educational and authorized testing purposes only.
>>>>>>> 4fe5de8 (Add full PoC and README for CVE-2024-55591 by @cherny_zhizn)