📦 Fortiadc

by Fortinet

🔍 What is Fortiadc?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2025-49813

HIGH CVSS 7.2 Aug 12, 2025

This CVE describes an OS command injection vulnerability in Fortinet FortiADC that allows authenticated attackers with low privileges to execute arbitrary commands via crafted HTTP parameters. The vul...

CVE-2025-31104

HIGH CVSS 7.2 Jun 10, 2025

This OS command injection vulnerability in FortiADC allows authenticated attackers to execute arbitrary operating system commands via specially crafted HTTP requests. It affects multiple FortiADC vers...

CVE-2023-37933

HIGH CVSS 8.8 Mar 11, 2025

This is a stored cross-site scripting (XSS) vulnerability in FortiADC's web management interface. Authenticated attackers can inject malicious scripts via HTTP/HTTPS requests that execute when adminis...

CVE-2023-50178

HIGH CVSS 7.4 Jul 9, 2024

This CVE describes an improper certificate validation vulnerability in FortiADC that allows remote unauthenticated attackers to perform Man-in-the-Middle attacks. The vulnerability affects communicati...

CVE-2023-41673

HIGH CVSS 7.1 Dec 13, 2023

An improper authorization vulnerability in Fortinet FortiADC allows low-privileged users to read or backup the full system configuration via HTTP/HTTPS requests. This exposes sensitive configuration d...

CVE-2023-25607

HIGH CVSS 7.8 Oct 10, 2023

This CVE describes an OS command injection vulnerability in Fortinet management interfaces that allows authenticated users with READ permissions to execute arbitrary shell commands. The vulnerability ...

CVE-2022-35849

HIGH CVSS 7.8 Sep 13, 2023

This vulnerability allows authenticated attackers to execute arbitrary operating system commands on FortiADC devices by exploiting improper input sanitization in the management interface. Attackers ca...

CVE-2023-26210

HIGH CVSS 7.8 Jun 13, 2023

This CVE describes OS command injection vulnerabilities in Fortinet products that allow local authenticated attackers to execute arbitrary shell commands with root privileges via crafted CLI requests....

CVE-2023-27999

HIGH CVSS 7.8 May 3, 2023

This vulnerability allows authenticated attackers to execute arbitrary operating system commands on FortiADC devices by injecting malicious arguments into legitimate commands. It affects FortiADC vers...

CVE-2022-40679

HIGH CVSS 7.8 Apr 11, 2023

This CVE-2022-40679 is an OS command injection vulnerability in multiple Fortinet products that allows authenticated attackers to execute arbitrary commands via crafted arguments. It affects FortiADC ...

CVE-2022-27482

HIGH CVSS 7.8 Feb 16, 2023

This CVE describes an OS command injection vulnerability in Fortinet FortiADC that allows authenticated attackers to execute arbitrary shell commands with root privileges via CLI commands. The vulnera...

CVE-2025-54971

MEDIUM CVSS 4.3 Nov 18, 2025

This vulnerability allows read-only administrators in Fortinet FortiADC to access external resource passwords through system logs. It affects multiple FortiADC versions from 6.2 through 7.4.0. The exp...

CVE-2025-48839

MEDIUM CVSS 6.6 Nov 18, 2025

An authenticated attacker can execute arbitrary code on FortiADC devices by sending specially crafted HTTP requests that trigger an out-of-bounds write vulnerability. This affects FortiADC versions 6....

CVE-2025-59921

MEDIUM CVSS 6.5 Oct 14, 2025

An authenticated attacker can access sensitive information on vulnerable FortiADC devices by sending specially crafted HTTP/HTTPS requests. This affects FortiADC versions 7.4.0, 7.2.3 and below, 7.1.4...

CVE-2022-23439

MEDIUM CVSS 4.7 Jan 22, 2025

This vulnerability allows attackers to poison web caches by sending crafted HTTP requests with malicious Host headers to Fortinet devices. Attackers can redirect users to arbitrary malicious servers, ...

CVE-2023-50181

MEDIUM CVSS 4.9 Jul 9, 2024

An improper access control vulnerability in Fortinet FortiADC allows authenticated read-only users to perform unauthorized write actions via crafted HTTP/HTTPS requests. This affects FortiADC versions...