Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-25690

CVSS 4.0 · Medium EPSS 0.03% · P8

Affected Version Matrix 5

VendorProductVersion RangeStatus
FortinetFortiDeceptor6.0.0≤ 6.0.2affected
5.3.0≤ 5.3.3affected
5.2.0≤ 5.2.1affected
5.1.0affected
5.0.0affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-25690

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.0.0 through 6.0.2, FortiDeceptor 5.3.0 through 5.3.3, FortiDeceptor 5.2.0 through 5.2.1, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions may allow an authenticated attacker with at least read-only admin permission to read log files via HTTP crafted requests.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
参数注入或修改
Source: NVD (National Vulnerability Database)
Vulnerability Title
Fortinet FortiDeceptor 参数注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Fortinet FortiDeceptor是美国飞塔(Fortinet)公司的一款网络威胁检测平台。该平台主要通过欺骗技术暴露网络威胁等。 Fortinet FortiDeceptor 6.0.0至6.0.2版本、5.3.0至5.3.3版本、5.2.0至5.2.1版本、5.1所有版本和5.0所有版本存在参数注入漏洞,该漏洞源于命令中参数分隔符中和不当,可能导致具有至少只读管理员权限的经过身份验证的攻击者通过HTTP特制请求读取日志文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
FortinetFortiDeceptor 6.0.0 ~ 6.0.2 cpe:2.3:a:fortinet:fortideceptor:6.0.2:*:*:*:*:*:*:*

II. Public POCs for CVE-2026-25690

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-25690

登录查看更多情报信息。
Advisory · 1

Same Patch Batch · Fortinet · 2026-05-12 · 11 CVEs total

CVE-2026-260839.1 CRITICALFortinet FortiSandbox 安全漏洞
CVE-2026-442779.1 CRITICALFortinet FortiAuthenticator 访问控制错误漏洞
CVE-2025-538448.3 HIGHFortinet FortiOS 缓冲区错误漏洞
CVE-2025-538706.5 MEDIUMFortinet FortiAP 操作系统命令注入漏洞
CVE-2025-536816.3 MEDIUMFortinet FortiMail SQL注入漏洞
CVE-2025-536806.1 MEDIUMFortinet FortiAP 操作系统命令注入漏洞
CVE-2025-676045.2 MEDIUMFortinet FortiAnalyzer 安全漏洞
CVE-2026-250885.1 MEDIUMFortinet FortiNDR SQL注入漏洞
CVE-2026-442795.0 MEDIUMFortinet FortiTokenAndroid 安全漏洞
CVE-2026-442782.1 LOWFortinet FortiClientWindows 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2026-25690

No comments yet


Leave a comment