An Out-of-bounds Write vulnerability [CWE-787] in FortiADC 8.0.0, 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.2 all versions may allow an authenticated attacker to execute arbitrary code via specially crafted HTTP requests.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-225 |
|
History
Thu, 20 Nov 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiadc:8.0.0:*:*:*:*:*:*:* |
Tue, 18 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Out-of-bounds Write vulnerability [CWE-787] in FortiADC 8.0.0, 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.2 all versions may allow an authenticated attacker to execute arbitrary code via specially crafted HTTP requests. | |
| First Time appeared |
Fortinet
Fortinet fortiadc |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:fortinet:fortiadc:6.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.1.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.1.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.1.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.1.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.1.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.2.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.2.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.2.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.2.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.2.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.2.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.2.7:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.2.8:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.4.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.4.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.4.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.4.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.4.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.4.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.4.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.4.7:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.6.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.6.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.6.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:8.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortiadc |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published: 2025-11-18T17:01:25.620Z
Updated: 2025-11-19T04:55:33.208Z
Reserved: 2025-05-27T08:00:40.714Z
Link: CVE-2025-48839
Updated: 2025-11-18T20:20:50.614Z
Status : Analyzed
Published: 2025-11-18T17:16:02.610
Modified: 2025-11-20T14:37:57.427
Link: CVE-2025-48839
No data.