Out-of-bounds access in CAPWAP daemon (FortiOS)

admin • May 20, 2026
| 3 min read | 8 views views

An Out-Of-Bounds Write vulnerability [CWE-787] in FortiOS capwap daemon may allow an attacker controlling an authenticated FortiAP FortiExtender or FortiSwitch to gain execution privileges on the FortiGate device

VersionAffectedSolution
FortiOS 7.67.6.0 through 7.6.3Upgrade to 7.6.4 or above
FortiOS 7.47.4.0 through 7.4.8Upgrade to 7.4.9 or above
FortiOS 7.27.2.0 through 7.2.11Upgrade to 7.2.12 or above

Workarounds : Disable capwap daemon :
“`config global
config system global
set wireless-controller disable
end

**Post-Change Configuration Validation**

show full | grep wireless-controller
set wireless-controller disable
set wireless-controller-port 5246

show full | grep fortiextender
set fortiextender disable
set fortiextender-data-port 25246
set fortiextender-discovery-lockdown disable
set fortiextender-provision-on-authorization disable
set fortiextender-vlan-mode disable
“`

IR NumberFG-IR-26-123
Published DateMay 12, 2026
ComponentOTHERS
Severity High
DiscoveredInternal
Attack TypeAuthenticated
Known ExploitedNo
CVSSv3 Score8.3
ImpactExecute unauthorized code or commands
CVE IDCVE-2025-53844Workarounds : Disable capwap daemon :
“`config global
config system global
set wireless-controller disable
end
**Post-Change Configuration Validation**

show full | grep wireless-controller
set wireless-controller disable
set wireless-controller-port 5246

show full | grep fortiextender
set fortiextender disable
set fortiextender-data-port 25246
set fortiextender-discovery-lockdown disable
set fortiextender-provision-on-authorization disable
set fortiextender-vlan-mode disable
“`

reference: https://www.fortiguard.com/psirt/FG-IR-26-123

#CVE #CWE-787 #FG-IR-26-123 #fortigate #fortinet #FortiOS

admin

Author at The Sharing KH

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *