Description
An improper neutralization of special elements used in an OS command ("OS Command Injection") vulnerability [CWE-78] vulnerability in Fortinet FortiAP 7.6.0 through 7.6.2, FortiAP 7.4.0 through 7.4.5, FortiAP 7.2 all versions, FortiAP 7.0 all versions, FortiAP 6.4 all versions, FortiAP-U 7.0.0 through 7.0.5, FortiAP-U 6.2 all versions, FortiAP-W2 7.4.0 through 7.4.4, FortiAP-W2 7.2 all versions, FortiAP-W2 7.0 all versions allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests.
Published: 2026-05-12
Score: 6.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an OS command injection flaw that allows an authenticated privileged user to craft and send malicious CLI requests to a Fortinet FortiAP access point, leading to execution of arbitrary operating‑system commands. This can compromise the confidentiality, integrity, and availability of the device and any connected network segments.

Affected Systems

Affected devices include Fortinet FortiAPs, FortiAP‑U, and FortiAP‑W2. Versions ranging from FortiAP 7.6.0 through 7.6.2, FortiAP 7.4.0 through 7.4.5, all 7.2 releases, all 7.0 releases, all 6.4 releases, FortiAP‑U 7.0.0 through 7.0.5 as well as all 6.2 releases, FortiAP‑W2 7.4.0 through 7.4.4, all 7.2 releases, and all 7.0 releases are impacted.

Risk and Exploitability

The CVSS score of 6.1 indicates a medium severity assessment, but the nature of the flaw—unauthorized command execution—raises the threat level. Exploitation requires authentication with privileged credentials and network access to the device’s CLI interface, characteristics that typically align with a compromised internal user or an attacker who has gained foothold and then escalated privileges. No EPSS score is available and the vulnerability is not currently listed in CISA’s KEV catalog, suggesting that no widespread public exploits have been observed. Nevertheless, the potential impact of full device compromise warrants close attention and timely mitigation.

Generated by OpenCVE AI on May 12, 2026 at 18:21 UTC.

Remediation

Vendor Solution

Upgrade to FortiAP-U version 7.0.6 or above Upgrade to FortiAP-W2 version 7.4.5 or above Upgrade to FortiAP version 7.6.3 or above Upgrade to FortiAP version 7.4.6 or above


OpenCVE Recommended Actions

  • Upgrade all FortiAP devices to the latest firmware (FortiAP‑U 7.0.6 or later, FortiAP‑W2 7.4.5 or later, and FortiAP 7.6.3 or 7.4.6 or later as provided by Fortinet).
  • Restrict command‑line interface access to the FortiAP devices by implementing network segmentation or firewall rules that allow only trusted administrators to connect.
  • Enforce least‑privilege authentication on the FortiAP devices, ensuring that only accounts with necessary privileges can use the CLI.

Generated by OpenCVE AI on May 12, 2026 at 18:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 18:45:00 +0000

Type Values Removed Values Added
Title Fortinet FortiAP OS Command Injection Vulnerability

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description An improper neutralization of special elements used in an OS command ("OS Command Injection") vulnerability [CWE-78] vulnerability in Fortinet FortiAP 7.6.0 through 7.6.2, FortiAP 7.4.0 through 7.4.5, FortiAP 7.2 all versions, FortiAP 7.0 all versions, FortiAP 6.4 all versions, FortiAP-U 7.0.0 through 7.0.5, FortiAP-U 6.2 all versions, FortiAP-W2 7.4.0 through 7.4.4, FortiAP-W2 7.2 all versions, FortiAP-W2 7.0 all versions allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests.
First Time appeared Fortinet
Fortinet fortiap
Fortinet fortiap-u
Fortinet fortiap-w2
Weaknesses CWE-78
CPEs cpe:2.3:a:fortinet:fortiap-u:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.9:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.6.2:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiap
Fortinet fortiap-u
Fortinet fortiap-w2
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Fortinet Fortiap Fortiap-u Fortiap-w2
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-05-13T03:58:25.615Z

Reserved: 2025-07-08T09:23:05.011Z

Link: CVE-2025-53680

cve-icon Vulnrichment

Updated: 2026-05-12T19:01:53.329Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T18:16:35.687

Modified: 2026-05-12T18:57:02.307

Link: CVE-2025-53680

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T18:30:22Z

Weaknesses