OWASP Nettacker Adds Detection for Critical Fortinet RCE Flaw CVE-2025-32756
The open-source security scanner OWASP Nettacker has integrated a new vulnerability detection module targeting a critical remote code execution flaw in Fortinet's FortiVoice and FortiMail products. The module, `fortivoice_cve_2025_32756_vuln`, is designed to identify exposed and potentially exploitable `/remote/hostcheck_validate` endpoints on affected devices. This addition directly addresses a specific, high-severity threat vector now tracked in the public CVE database.
The module's development follows a formal pull request to the Nettacker project, closing a specific issue (#1382) in its public GitHub repository. The contribution process highlights the active, community-driven nature of threat intelligence integration within the security tooling ecosystem. The code is intended to automate the detection of systems vulnerable to CVE-2025-32756, a flaw that could allow attackers to execute arbitrary commands on unpatched Fortinet appliances.
This integration signals the rapid weaponization of public vulnerability intelligence into accessible offensive security tools. For network defenders, the module's availability in a popular reconnaissance framework means that both malicious actors and security teams can now easily scan for this specific Fortinet exposure. It places immediate pressure on organizations using these devices to verify patches and conduct internal scans, as the flaw's signature is now programmatically detectable.