CVE-2025-46776
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-11-20
Assigner: Fortinet, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fortinet | fortiextender_firmware | From 7.0.0 (inc) to 7.4.8 (exc) |
| fortinet | fortiextender_firmware | From 7.6.0 (inc) to 7.6.3 (exc) |
| fortinet | fortiextender | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a classic buffer overflow in Fortinet FortiExtender versions 7.0 through 7.6.1. It occurs due to a buffer copy operation that does not check the size of the input, allowing an authenticated user to execute arbitrary code or commands by sending specially crafted CLI commands.
How can this vulnerability impact me? :
An attacker who is authenticated can exploit this vulnerability to execute arbitrary code or commands on the affected FortiExtender device. This could lead to unauthorized control over the device, potentially compromising its confidentiality, integrity, and availability.