CVE-2025-46776

A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to execute arbitrary code or commands via crafted CLI commands.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:*

History

20 Nov 2025, 14:39

Type Values Removed Values Added
CPE cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:*
References () https://fortiguard.fortinet.com/psirt/FG-IR-25-251 - () https://fortiguard.fortinet.com/psirt/FG-IR-25-251 - Vendor Advisory
First Time Fortinet
Fortinet fortiextender
Fortinet fortiextender Firmware

18 Nov 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-18 17:16

Updated : 2025-11-20 14:39


NVD link : CVE-2025-46776

Mitre link : CVE-2025-46776

CVE.ORG link : CVE-2025-46776


JSON object : View

Products Affected

fortinet

  • fortiextender
  • fortiextender_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')