Fortinet’s Zero-Day Drama: FortiVoice Phones Get a Security Makeover!
Fortinet has patched a critical zero-day vulnerability in FortiVoice systems that allowed attackers to execute remote code. The flaw, also affecting other Fortinet products, was actively exploited in the wild. Fortinet advises disabling HTTP/HTTPS administrative interfaces and checking for fcgi debugging as signs of compromise.

Hot Take:
Oh, Fortinet, you’ve done it again! Imagine a phone system that’s more popular with hackers than a free donut day at the local bakery. With a zero-day vulnerability that let attackers waltz right into your systems, it’s no wonder Fortinet’s servers were practically throwing a house party for cybercriminals. Thankfully, Fortinet has finally put a stop to the shenanigans with their recent patch. Better late than never, right?
Key Points:
- Fortinet patched a critical zero-day vulnerability (CVE-2025-32756) affecting FortiVoice systems.
- The vulnerability allowed remote code execution via malicious HTTP requests.
- Attackers exploited this flaw to deploy malware and steal credentials.
- Compromised systems had ‘fcgi debugging’ enabled, a key indicator of compromise.
- Fortinet advises disabling HTTP/HTTPS administrative interfaces as a precaution.