A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiWeb CLI version 7.6.0 through 7.6.3 and before 7.4.8 allows a privileged attacker to execute arbitrary code or commands via crafted CLI commands
Fixes

Solution

Please upgrade to FortiWeb version 8.0.0 or above Please upgrade to FortiWeb version 7.6.4 or above Please upgrade to FortiWeb version 7.4.9 or above


Workaround

No workaround given by the vendor.

History

Thu, 14 Aug 2025 06:30:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet fortiweb
CPEs cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiweb

Wed, 13 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Description A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiWeb CLI version 7.6.0 through 7.6.3 and before 7.4.8 allows a privileged attacker to execute arbitrary code or commands via crafted CLI commands
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-08-13T15:04:33.656Z

Reserved: 2025-04-10T08:12:13.516Z

Link: CVE-2025-32766

cve-icon Vulnrichment

Updated: 2025-08-13T14:15:11.449Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-12T19:15:29.107

Modified: 2025-08-14T01:21:55.713

Link: CVE-2025-32766

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-13T21:47:46Z