Stack buffer overflow in CAPWAP daemon

Summary

A stack-based overflow vulnerability [CWE-124] in FortiOS CAPWAP daemon may allow a remote unauthenticated attacker on an adjacent network to achieve arbitrary code execution via sending specially crafted packets. Note that in the default configuration, the attacker must be in control of an authorized FortiAP for the attack to succeed and have access to the same local IP subnet. Additionally, successful exploitation would require defeating stack protection and ASLR.

Version Affected Solution
FortiOS 7.6 7.6.0 through 7.6.3 Upgrade to 7.6.4 or above
FortiOS 7.4 7.4.0 through 7.4.8 Upgrade to 7.4.9 or above
FortiOS 7.2 7.2 all versions Migrate to a fixed release
FortiOS 7.0 7.0 all versions Migrate to a fixed release
FortiOS 6.4 6.4 all versions Migrate to a fixed release
FortiOS 6.2 6.2 all versions Migrate to a fixed release
FortiOS 6.0 6.0 all versions Migrate to a fixed release
FortiSASE 25.3 25.3.b Fortinet remediated this issue in 25.3.c and hence customers do not need to perform any action.
FortiSASE 24.4 Not affected Not Applicable
FortiSASE 23.3 Not affected Not Applicable
FortiSASE 23.2 Not affected Not Applicable
FortiSASE 23.1 Not affected Not Applicable
FortiSASE 22.4 Not affected Not Applicable
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Workarounds :
Disable security fabric access into interface.
Only allow legit devices in Wifi Controller > Managed FortiAPs
Remove inter-controller-peer elements in config wireless-controller inter-controller configuration

Warning :
if auto-auth-extension-device is enabled in config system interface, any device
can be authorized and then the vulnerability can be exploited without administrator
authorization.
Please note that auto-auth-extension-device is disabled by default

Acknowledgement

Internally discovered and reported by Gwendal Guégniaud of Fortinet Product Security team.

Timeline

2025-11-18: Initial publication
2025-11-21: add workarounds