FortiRecon provides outside-in coverage for risks towards customers.
External Attack Surface Management helps customers to identify exposure to known and unknown enterprise assets and associated vulnerabilities across the enterprise.
Vulnerability Intelligence Module under Adversary Centric Intelligence (ACI) provides realistic view of impact of the vulnerability based upon chatter and discussion of the same across various external sources such as Darkweb, social media, News / Blogs etc. |
|
CVE ID |
CVE-2014-8361 |
CVE Title |
D-Link Realtek SDK miniigd SOAP service code execution |
CVE Severity |
Critical |
ACI Reporting Coverage |
4 Reports (TECHINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2017-17106 |
CVE Title |
Zivif PR115-204-P-RS security bypass |
CVE Severity |
High |
ACI Reporting Coverage |
2 Reports (TECHINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2017-17215 |
CVE Title |
Huawei Router HG532 SOAP protocol command execution |
CVE Severity |
High |
ACI Reporting Coverage |
8 Reports (TECHINT/OSINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2018-12613 |
CVE Title |
phpMyAdmin file include |
CVE Severity |
High |
ACI Reporting Coverage |
2 Reports (TECHINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2020-10987 |
CVE Title |
Tenda AC15 AC1900 devices command execution |
CVE Severity |
High |
ACI Reporting Coverage |
7 Reports (TECHINT/Media) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2020-25506 |
CVE Title |
D-Link DNS-320 command execution |
CVE Severity |
Medium |
ACI Reporting Coverage |
5 Reports (TECHINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2021-35395 |
CVE Title |
Realtek Jungle SDK buffer overflow |
CVE Severity |
High |
ACI Reporting Coverage |
3 Reports (TECHINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2021-36260 |
CVE Title |
Multiple Hikvision products command execution |
CVE Severity |
Critical |
ACI Reporting Coverage |
3 Reports (TECHINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2021-46422 |
CVE Title |
Telesquare SDT-CW3B1 command execution |
CVE Severity |
Critical |
ACI Reporting Coverage |
3 Reports (TECHINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2022-1388
|
CVE Title |
F5 BIG-IP Missing Authentication Vulnerability |
CVE Severity |
High |
ACI Reporting Coverage |
14 Reports (OSINT, TECHINT, Media Darknet) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2022-22965 |
CVE Title |
Spring Framework JDK 9+ Remote Code Execution Vulnerability (Spring4Shell) |
CVE Severity |
High |
ACI Reporting Coverage |
16 Reports (OSINT, TECHINT, Media Darknet) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2022-25075 |
CVE Title |
Command injection vulnerability in TOTOLink A3000RU Router |
CVE Severity |
Medium |
ACI Reporting Coverage |
7 Reports (TECHINT/OSINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2022-26186 |
CVE Title |
Command injection vulnerability in TOTOLINK N600R Router |
CVE Severity |
Medium |
ACI Reporting Coverage |
4 Reports (TECHINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2022-26210 |
CVE Title |
Command injection vulnerability in Totolink A830R Router |
CVE Severity |
Medium |
ACI Reporting Coverage |
4 Reports (TECHINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2022-34538 |
CVE Title |
Command injection vulnerability in Digital Watchdog DW MEGApix IP cameras |
CVE Severity |
Low |
ACI Reporting Coverage |
3 Reports (TECHINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2022-37061 |
CVE Title |
Remote Command Injection in FLIR AX8 thermal sensor cameras |
CVE Severity |
High |
ACI Reporting Coverage |
3 Reports (TECHINT) |
Additional References |
|
EASM Scanner |
No |
CVE ID |
CVE-2022-30525 |
CVE Title |
Multiple Zyxel devices command execution |
CVE Severity |
Critical |
ACI Reporting Coverage |
12 Reports (OSINT, TECHINT, Media, Darknet) |
Additional Reference |
|
EASM Scanner |
No |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.