New exploits for Fortinet FortiClient and FortiOS, FUXA, FreeScout, and Eclipse Che. New signatures and PCAPs, plus PCAP normalization.

Happy Friday! The following are the Initial Access Intelligence team's deliverables for the past week.

CVE-2026-35616: Fortinet FortiClient EMS Certificate Chain Authentication Bypass

This week, the team added an exploit for a critical authentication bypass vulnerability affecting versions 7.4.5 and 7.4.6 of FortiClient EMS. CVE-2026-35616 was added to the VulnCheck KEV following Defused Cyber's reports of in-the-wild exploit attempts on April 4. It was added to CISA KEV two days later. Our updated Shodan query shows just over 1,000 instances online.

CVE-2026-25939: frangoteam FUXA Unauthenticated Remote Arbitrary Scheduler Write

The team added an original exploit this week for a critical authorization bypass in FUXA, a web-based SCADA / HMI platform for industrial automation, IoT and real-time process visualization. The vulnerability arises from missing authorization that allows unauthenticated, remote attackers to create and modify arbitrary schedulers, which ultimately enables remote code execution in ICS and SCADA environments. The team's Censys query finds 200 or so instances on the public internet with fairly global distribution. Our exploit comes with ASM queries, a target Docker container, Snort and Suricata rules, a PCAP, and a YARA rule.

CVE-2026-28289: FreeScout Zero-Width Space Injection RCE

The team developed an exploit for CVE-2026-28289, a critical file upload vulnerability in FreeScout, an open-source help desk and mailing system. The vulnerability allows for unauthenticated remote code execution via the mail subsystem. Exploitation requires the ability to send messages to the FreeScout system and knowledge of a known valid user. Our Censys query finds more than 700 hosts online. Our exploit comes with a target Docker container, ASM queries, Suricata and Snort rules, and PCAPs.

CVE-2025-12548: Eclipse Che machine-exec Unauthenticated WebSocket RCE

The team developed an exploit for CVE-2025-12548, an unauthenticated RCE vulnerability in Eclipse Che and Red Hat OpenShift DevSpaces. The flaw sits in machine-exec, a WebSocket service that developer IDEs use to open terminals inside workspace containers — and that ships with authentication disabled by default. Any attacker who can reach the service can run arbitrary commands in a developer's workspace. A Metasploit module is publicly available, though no threat actors or botnets have been observed exploiting this in the wild as of yet. Red Hat OpenShift DevSpaces is fixed in 3.22.1; upstream Eclipse Che has no code-level fix. Coverage includes an exploit with PCAPs and Suricata rules.

CVE-2024-21762: Fortinet FortiOS Out-of-Bounds Write RCE

By customer request, the team developed an exploit for CVE-2024-21762, a critical out-of-bounds write RCE vulnerability in Fortinet FortiOS that's been exploited by several China-nexus threat actors in addition to the Mirai botnet and multiple ransomware groups. The team's exploit joins previously delivered network rules and PCAPs and also adds ASM queries, which show roughly 500K internet-facing results.

PCAPs Normalized

All PCAPs have been standardized to include Ethernet frames and non-loopback addresses, ensuring consistent formatting across the dataset.

New Signatures and PCAPs Added

CVEVendorProductArtifact Name
CVE-2023-47248ApachePyArrowApache PyArrow Flight RPC DoPut Deserialization Remote Code Execution
CVE-2025-58179AstroAstroAstro Cloudflare Adapter SSRF
CVE-2024-7029AVTECHAVM1203AVTECH AVM1203 IP Camera Factory.cgi Command Injection
CVE-2025-71257BMCFootPrintsBMC FootPrints Authentication Bypass
CVE-2018-0127CiscoRV132W, RV134WCisco RV132W RV134W Information Disclosure via dumpmdm.cmd
CVE-2020-26073CiscoSD-WAN vManageCisco SD-WAN vManage token Local File Inclusion
CVE-2023-5074D-LinkD-View 8D-Link D-View 8 Static JWT Key Authentication Bypass
CVE-2023-7309DahuaE-MapDahua E-Map SOAP Bitmap File Upload Path Traversal
CVE-2021-20124DraytekVigorConnectDraytek VigorConnect getMapImg_acs2 Local File Inclusion
CVE-2021-20123DraytekVigorConnectDraytek VigorConnect Local File Inclusion via DownloadFileServlet
CVE-2026-25939FUXAFUXAFUXA Scheduler Authorization Bypass Arbitrary Scheduler Write
CVE-2026-4020Gravity FormsGravity SMTPGravity SMTP Sensitive Information Exposure
CVE-2020-7209HPLinuxKIHP LinuxKI pid Parameter Command Injection
CVE-2020-23575KyoceraD-COPIA253MFKyocera d-COPIA253MF Directory Traversal Arbitrary File Read
CVE-2025-22214LandrayEISLandray EIS SQL Injection
CVE-2023-26067LexmarkMC3224iLexmark Embedded Web Server Fax Trace Settings Command Injection
CVE-2023-35844LightdashLightdashLightdash slack-image Directory Traversal Arbitrary File Read
CVE-2025-22896mySCADAmyPRO ManagermySCADA myPRO Manager Credential Disclosure
CVE-2024-0305NcastNcastNcast busiFacade Command Injection
CVE-2024-57046NetgearDGN2200Netgear DGN2200 Authentication Bypass
CVE-2021-3223Node-REDNode-RED DashboardNode-RED Dashboard Local File Inclusion
CVE-2016-5674NUUONVRmini 2, NVRsoloNUUO NVR Debugging Center Command Injection
CVE-2025-1338NUUOCameraNUUO Camera Command Injection
CVE-2020-14864OracleBusiness IntelligenceOracle Business Intelligence getPreviewImage Directory Traversal Local File Inclusion
CVE-2024-49380PlentiPlentiPlenti Arbitrary File Write via postLocal
CVE-2022-39986RaspAPRaspAPRaspAP OpenVPN cfg_id Command Injection
CVE-2022-31126Roxy-WIRoxy-WIRoxy-WI Command Injection Remote Code Execution
CVE-2018-3760RubyRailsRuby Rails Asset Pipeline Directory Traversal
CVE-2019-14251TemenosT24Temenos T24 docDownloadPath Local File Inclusion
CVE-2019-19825TOTOLINKRouterTOTOLINK Router CAPTCHA Bypass Information Disclosure
CVE-2022-31847WavlinkWN579 X3Wavlink WN579 X3 Information Disclosure via ExportAllSettings
CVE-2022-2488WavlinkWN535K2, WN535K3Wavlink touchlist_sync.cgi Command Injection
CVE-2022-2487WavlinkWN535K2, WN535K3Wavlink nightled.cgi OS Command Injection
CVE-2016-10108Western DigitalMyCloudWestern Digital MyCloud google_analytics.php Command Injection
CVE-2019-18371XiaomiMi WiFi R3GXiaomi Mi WiFi R3G extdisks Path Traversal