An Out-of-bounds Write vulnerability [CWE-787] in FortiADC 8.0.0, 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.2 all versions may allow an authenticated attacker to execute arbitrary code via specially crafted HTTP requests.
Advisories

No advisories yet.

Fixes

Solution

Upgrade to FortiADC version 8.0.1 or above Upgrade to FortiADC version 7.6.3 or above Upgrade to FortiADC version 7.4.8 or above


Workaround

No workaround given by the vendor.

History

Thu, 20 Nov 2025 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiadc:8.0.0:*:*:*:*:*:*:*

Tue, 18 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Description An Out-of-bounds Write vulnerability [CWE-787] in FortiADC 8.0.0, 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.2 all versions may allow an authenticated attacker to execute arbitrary code via specially crafted HTTP requests.
First Time appeared Fortinet
Fortinet fortiadc
Weaknesses CWE-787
CPEs cpe:2.3:h:fortinet:fortiadc:6.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.7:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.8:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.4.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.4.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.4.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.4.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.4.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.4.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.4.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.4.7:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.6.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.6.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.6.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:8.0.0:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiadc
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-11-19T04:55:33.208Z

Reserved: 2025-05-27T08:00:40.714Z

Link: CVE-2025-48839

cve-icon Vulnrichment

Updated: 2025-11-18T20:20:50.614Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-18T17:16:02.610

Modified: 2025-11-20T14:37:57.427

Link: CVE-2025-48839

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses