A critical path-traversal vulnerability, CVE-2025-64446, has been reported in Fortinet FortiWeb web application firewall (WAF) appliances. The flaw resides in the GUI component and can be triggered via crafted HTTP(S) requests that cause path confusion or directory traversal, enabling unauthenticated attackers to execute administrative commands or create unauthorized administrative accounts on affected devices. Public reporting and independent researchers confirmed successful exploitation against FortiWeb 8.0.1 (the issue was addressed in FortiWeb 8.0.2); multiple 7.x and 8.x builds were indicated as impacted in vendor release notes and community advisories. Evidence of active exploitation in the wild has been published by several security outlets and the issue has been prioritized for rapid remediation by US authorities.
The IONIX research team is tracking ongoing exploitation attempts and recommends immediate patching. Potentially affected assets are outlined in this post.
References:

