FortiWeb Under Siege: Path Traversal Exploit Creates Admin Chaos!
Fortinet FortiWeb devices are under siege! A path traversal vulnerability lets sneaky hackers create admin accounts without breaking a sweat. Update to version 8.0.2 pronto and watch out for rogue admins named Testpoint and trader1. Check logs, IP addresses, and keep those interfaces safely tucked away from the internet!

Hot Take:
Another day, another hacker playing “admin” on unsuspecting FortiWeb devices. It’s like a virtual game of musical chairs, except everyone’s left standing without a seat… or their security. Time to update and batten down the digital hatches, folks! Fortinet’s latest scare is proof that path traversal vulnerabilities are the cybersecurity equivalent of leaving your keys in the front door.
Key Points:
– A path traversal vulnerability in FortiWeb is allowing unauthorized admin account creation.
– The issue affects FortiWeb versions earlier than 8.0.2.
– Exploits are being used globally, creating admin accounts with usernames like “trader1” and “trader.”
– Attackers are using HTTP POST requests to exploit the vulnerability.
– Administrators are advised to update to version 8.0.2 and monitor for unauthorized access.
