An improper neutralization of special elements used in an OS command ("OS Command Injection") vulnerability [CWE-78] vulnerability in Fortinet FortiAP 7.6.0 through 7.6.2, FortiAP 7.4.0 through 7.4.5, FortiAP 7.2 all versions, FortiAP 7.0 all versions, FortiAP 6.4 all versions, FortiAP-U 7.0.0 through 7.0.5, FortiAP-U 6.2 all versions, FortiAP-W2 7.4.0 through 7.4.4, FortiAP-W2 7.2 all versions, FortiAP-W2 7.0 all versions allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests.
History

Tue, 12 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 18:45:00 +0000

Type Values Removed Values Added
Title Fortinet FortiAP OS Command Injection Vulnerability

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description An improper neutralization of special elements used in an OS command ("OS Command Injection") vulnerability [CWE-78] vulnerability in Fortinet FortiAP 7.6.0 through 7.6.2, FortiAP 7.4.0 through 7.4.5, FortiAP 7.2 all versions, FortiAP 7.0 all versions, FortiAP 6.4 all versions, FortiAP-U 7.0.0 through 7.0.5, FortiAP-U 6.2 all versions, FortiAP-W2 7.4.0 through 7.4.4, FortiAP-W2 7.2 all versions, FortiAP-W2 7.0 all versions allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests.
First Time appeared Fortinet
Fortinet fortiap
Fortinet fortiap-u
Fortinet fortiap-w2
Weaknesses CWE-78
CPEs cpe:2.3:a:fortinet:fortiap-u:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:6.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-u:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap-w2:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:6.4.9:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiap:7.6.2:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiap
Fortinet fortiap-u
Fortinet fortiap-w2
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-05-13T03:58:25.615Z

Reserved: 2025-07-08T09:23:05.011Z

Link: CVE-2025-53680

cve-icon Vulnrichment

Updated: 2026-05-12T19:01:53.329Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T18:16:35.687

Modified: 2026-05-12T18:57:02.307

Link: CVE-2025-53680

cve-icon Redhat

No data.