Metrics
Affected Vendors & Products
Solution
Please upgrade to FortiWeb version 8.0.0 or above Please upgrade to FortiWeb version 7.6.4 or above Please upgrade to FortiWeb version 7.4.9 or above
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-25-383 |
![]() ![]() |
Thu, 14 Aug 2025 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortiweb |
|
CPEs | cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fortinet
Fortinet fortiweb |
Wed, 13 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 12 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiWeb CLI version 7.6.0 through 7.6.3 and before 7.4.8 allows a privileged attacker to execute arbitrary code or commands via crafted CLI commands | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-08-13T15:04:33.656Z
Reserved: 2025-04-10T08:12:13.516Z
Link: CVE-2025-32766

Updated: 2025-08-13T14:15:11.449Z

Status : Analyzed
Published: 2025-08-12T19:15:29.107
Modified: 2025-08-14T01:21:55.713
Link: CVE-2025-32766

No data.

Updated: 2025-08-13T21:47:46Z