CVE-2026-35616

CRITICAL KEV NUCLEI

Fortinet FortiClientEMS 7.4.5-7.4.6 - Command Injection

Title source: llm

Description

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Exploits (8)

nomisec WORKING POC 2 stars
by Alaatk · remote
https://github.com/Alaatk/CVE-2026-35616
nomisec WORKING POC
by wa6n3r · infoleak
https://github.com/wa6n3r/CVE-2026-35616
nomisec SCANNER
by keraattin · poc
https://github.com/keraattin/CVE-2026-35616
nomisec SCANNER
by BishopFox · poc
https://github.com/BishopFox/CVE-2026-35616-check
nomisec SCANNER
by fevar54 · poc
https://github.com/fevar54/CVE-2026-35616-detector.py
nomisec SUSPICIOUS
by z3r0h3ro · poc
https://github.com/z3r0h3ro/CVE-2026-35616-poc
nomisec SCANNER
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2026-35616

Nuclei Templates (1)

FortiClient EMS - Authentication Bypass
HIGHVERIFIEDby ritikchaddha
Shodan: http.favicon.hash:-800551065

Scores

CVSS v3 9.8
EPSS 0.3512
EPSS Percentile 97.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2026-04-06
VulnCheck KEV 2026-04-04
ENISA EUVD EUVD-2026-18963
CWE
CWE-284
Status published
Products (3)
fortinet/forticlientems 7.4.5
fortinet/forticlientems 7.4.6
Fortinet/FortiClientEMS 7.4.5 - 7.4.6
Published Apr 04, 2026
KEV Added Apr 06, 2026
Tracked Since Apr 04, 2026