CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs May 08, 2026

PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands - CyberSecurityNews

CyberSecurityNews Archived May 08, 2026 ✓ Full text saved

PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands CyberSecurityNews

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security News PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands By Abinaya April 18, 2026 A proof-of-concept (PoC) exploit has been publicly released for a critical vulnerability in Fortinet’s FortiSandbox product, tracked as CVE-2026-39808. The flaw allows an unauthenticated attacker to execute arbitrary operating system commands as root, the highest privilege level, without requiring any login credentials. The vulnerability was originally discovered in November 2025 and has now been made public following Fortinet’s patch release in April 2026. Security researchers and defenders are urged to apply the fix immediately, as a working exploit is now freely available on GitHub. CVE-2026-39808 is an OS command injection vulnerability affecting Fortinet’s FortiSandbox, a widely used sandboxing solution designed to detect and analyze advanced threats and malware. The flaw resides in the /fortisandbox/job-detail/tracer-behavior endpoint. How Simple Is the Attack? An attacker can inject malicious operating system commands through the jid GET parameter by using the pipe symbol (|) a common technique used to chain commands in Unix-based systems. OS command injection via | in the jid parameter(source : GitHub) Because the vulnerable endpoint fails to properly sanitize user input, the injected commands are executed directly by the underlying operating system with root-level privileges. FortiSandbox versions 4.4.0 through 4.4.8 are confirmed to be affected by this vulnerability. What makes CVE-2026-39808 especially alarming is how easy it is to exploit. According to researcher samu-delucas, who published the PoC on GitHub, a single curl command is enough to achieve unauthenticated remote code execution (RCE) as root: curl -s -k --get "http://$HOST/fortisandbox/job-detail/tracer-behavior" --data-urlencode "jid=|(id > /web/ng/out.txt)|" In this example, the attacker redirects command output to a file stored in the web root, which can then be retrieved through a browser. This means an attacker could read sensitive files, drop malware, or fully compromise the host system all without ever logging in. Fortinet’s Response Fortinet patched the vulnerability and published its official advisory under FG-IR-26-100 through its FortiGuard PSIRT portal. The advisory confirms the severity of the flaw and outlines affected versions. Organizations running FortiSandbox 4.4.0 through 4.4.8 should upgrade to a patched version without delay. Patch immediately:  upgrade FortiSandbox to a version beyond 4.4.8 as specified in Fortinet’s official advisory. Audit exposed instances: check whether FortiSandbox management interfaces are exposed to untrusted networks or the public internet. Review logs:  look for unusual GET requests to the /fortisandbox/job-detail/tracer-behavior endpoint as indicators of exploitation attempts. Apply network segmentation: restrict access to FortiSandbox administrative interfaces to trusted IP ranges only. With a working PoC now publicly available, the window for exploitation is open. Security teams should treat this as a critical-priority patch and act immediately to secure affected systems. Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories. Tags cyber security cyber security news Copy URL Linkedin Twitter ReddIt Telegram Abinayahttps://cybersecuritynews.com/ Abi is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space. Trending News Hackers Abuse Signed Logitech Installer to Deploy TCLBANKER Banking Trojan New Phishing Attack Weaponizing Event Invitations to Steal Login Credentials Hackers Breach Government and Military Servers by Exploiting cPanel Vulnerability Trellix Source Code Breach – Hackers Gain Unauthorized Access to Repository Iranian-Nexus Operation Targets Oman Ministries With Webshells, SQL Escalation, and Data Theft Latest News Cyber Security News Hackers Deploy Modular RAT With Credential Theft and Screenshot Capture Capabilities Cyber Security Škoda Security Incident Exposes Customers Data From Online Shop Cyber Security News Hackers Use Fake OpenClaw Installer to Steal Crypto Wallet and Password Manager Credentials Cyber Security News New ZiChatBot Malware Uses Zulip REST APIs as Command and Control Server Cyber Attack News Hackers Leveraged Hugging Face and ClawHub With 575+ Malicious Skills to Deploy Malware
    💬 Team Notes
    Article Info
    Source
    CyberSecurityNews
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    May 08, 2026
    Archived
    May 08, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗