A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to execute arbitrary code or commands via crafted CLI commands.
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-251 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
20 Nov 2025, 14:39
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:* |
|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-25-251 - Vendor Advisory | |
| First Time |
Fortinet
Fortinet fortiextender Fortinet fortiextender Firmware |
18 Nov 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 17:16
Updated : 2025-11-20 14:39
NVD link : CVE-2025-46776
Mitre link : CVE-2025-46776
CVE.ORG link : CVE-2025-46776
JSON object : View
Products Affected
fortinet
- fortiextender
- fortiextender_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
