{"uuid": "479f24d6-594c-4e96-9b89-20f04766dee9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42475", "type": "published-proof-of-concept", "source": "https://t.me/ptswarm/164", "content": "Producing a POC for CVE-2022-42475 (Fortinet RCE)\n\n\ud83d\udc64 by Alain Mowat\n\nLate last year a new remote code execution vulnerability was discovered in Fortinet\u2019s SSLVPN service. Given the relative lack of information surrounding it at the time, researcher decided to attempt to produce a POC for the vulnerability.\n\n\ud83d\udcdd Contents:\n\u25cf Background information\n\u25cf Extracting the firmware\n\u25cf Searching for the patched function(s)\n\u25cf Getting a crash\n\u25cf The real patched bug\n\u25cf Looking back at the original vulnerability\n\nhttps://blog.scrt.ch/2023/03/14/producing-a-poc-for-cve-2022-42475-fortinet-rce/", "creation_timestamp": "2023-03-15T07:47:19.000000Z"}