CVE-2023-46718

A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.12 and 6.4.6 through 6.4.15 and 6.2.9 through 6.2.16 and 6.0.13 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted CLI commands.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*

History

16 Oct 2025, 13:01

Type Values Removed Values Added
First Time Fortinet fortiproxy
Fortinet fortios
Fortinet
References () https://fortiguard.fortinet.com/psirt/FG-IR-23-354 - () https://fortiguard.fortinet.com/psirt/FG-IR-23-354 - Vendor Advisory
CPE cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

14 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-14 16:15

Updated : 2025-10-16 13:01


NVD link : CVE-2023-46718

Mitre link : CVE-2023-46718

CVE.ORG link : CVE-2023-46718


JSON object : View

Products Affected

fortinet

  • fortios
  • fortiproxy
CWE
CWE-121

Stack-based Buffer Overflow