Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.8
Fortinet FortiSwitchAX Fixed: Unauthorized Code Execution via Network Packet
CVE-2026-22627
Summary
A flaw in Fortinet's FortiSwitchAX Fixed allows an attacker on the same local network to send a special packet that could execute unauthorized code or commands on the device. This is a serious risk because an attacker could take control of the device without needing a password. Update to the latest version of FortiSwitchAX Fixed to fix this issue.
Original title
A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an unauthenticated attacker within the same adjac...
Original description
A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an unauthenticated attacker within the same adjacent network to execute unauthorized code or commands on the device via sending a crafted LLDP packet.
nvd CVSS3.1
8.8
Vulnerability type
CWE-120
Classic Buffer Overflow
Published: 10 Mar 2026 · Updated: 14 Mar 2026 · First seen: 11 Mar 2026