CVE-2025-32756

CRITICAL CISA KEV
Published May 13, 2025 Modified Jan 14, 2026 CWE-121 CWE-787

Description

A stack-based buffer overflow vulnerability [CWE-121] vulnerability in Fortinet FortiCamera 2.1.0 through 2.1.3, FortiCamera 2.0 all versions, FortiCamera 1.1 all versions, FortiMail 7.6.0 through 7.6.2, FortiMail 7.4.0 through 7.4.4, FortiMail 7.2.0 through 7.2.7, FortiMail 7.0.0 through 7.0.8, FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.7, FortiNDR 7.2.0 through 7.2.4, FortiNDR 7.0.0 through 7.0.6, FortiRecorder 7.2.0 through 7.2.3, FortiRecorder 7.0.0 through 7.0.5, FortiRecorder 6.4.0 through 6.4.5, FortiVoice 7.2.0, FortiVoice 7.0.0 through 7.0.6, FortiVoice 6.4.0 through 6.4.10 allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie.

CVSS v3.1 Score

9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA Known Exploited Vulnerability

This vulnerability is actively exploited in the wild.

Added: May 14, 2025 Remediation due: Jun 4, 2025

Weakness Type (CWE)

CWE-121 CWE-121
CWE-787 Out-of-bounds Write

Affected Products

Vendor Product
fortinet fortimail
fortinet fortimail
fortinet fortimail
fortinet fortimail
fortinet fortindr
fortinet fortindr
fortinet fortindr
fortinet fortindr
fortinet fortindr
fortinet fortindr
fortinet fortindr
fortinet fortindr
fortinet fortindr
fortinet fortindr
fortinet fortindr
fortinet fortirecorder
fortinet fortirecorder
fortinet fortirecorder
fortinet fortivoice
fortinet fortivoice
fortinet fortivoice
fortinet forticamera_firmware
fortinet forticamera
fortinet forticamera_firmware
fortinet forticamera

References

Frequently Asked Questions

What is CVE-2025-32756? +
A stack-based buffer overflow vulnerability [CWE-121] vulnerability in Fortinet FortiCamera 2.1.0 through 2.1.3, FortiCamera 2.0 all versions, FortiCamera 1.1 all versions, FortiMail 7.6.0 through 7.6.2, FortiMail 7.4.0 through 7.4.4, FortiMail 7.2.0 through 7.2.7, FortiMail 7.0.0 through 7.0.8, FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.7, FortiNDR 7.2.0 through 7.2.4, FortiNDR 7.0.0 through 7.0.6, FortiRecorder 7.2.0 through 7.2.3, FortiRecorder 7.0.0 through 7.0.5, FortiRecorder 6.4.0 through 6.4.5, FortiVoice 7.2.0, FortiVoice 7.0.0 through 7.0.6, FortiVoice 6.4.0 through 6.4.10 allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie. It has a CVSS v3.1 base score of 9.8 (CRITICAL). This vulnerability is listed in CISA's Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild.
How severe is CVE-2025-32756? +
CVE-2025-32756 has a CVSS v3.1 score of 9.8 out of 10, rated CRITICAL. This is a critical vulnerability that should be patched immediately.
What products are affected by CVE-2025-32756? +
CVE-2025-32756 affects products from fortinet, specifically: forticamera, forticamera_firmware, fortimail, fortindr, fortirecorder, fortivoice. Check the affected products table above for specific version ranges.
How do I check if I'm vulnerable to CVE-2025-32756? +
You can use Secably's free Website Scanner to check your website for known vulnerabilities. For infrastructure scanning, use the Port Scanner to identify exposed services that may be affected. Check the vendor advisories linked above for specific patch and version information.

Related Vulnerabilities

Don't wait for an exploit

Scan your website for vulnerabilities like CVE-2025-32756 — free, no signup required.

Start Free Scan