High severity8.8NVD Advisory· Published Mar 10, 2026· Updated Apr 9, 2026
CVE-2026-22627
CVE-2026-22627
Description
A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an unauthenticated attacker within the same adjacent network to execute unauthorized code or commands on the device via sending a crafted LLDP packet.
Affected products
1- cpe:2.3:a:fortinet:fortiswitchaxfixed:*:*:*:*:*:*:*:*Range: >=1.0.0,<1.0.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- fortiguard.fortinet.com/psirt/FG-IR-26-086nvdVendor Advisory
News mentions
0No linked articles in our index yet.