CVE-2017-7341

An OS Command Injection vulnerability in Fortinet FortiWLC 6.1-2 through 6.1-5, 7.0-7 through 7.0-10, 8.0 through 8.2, and 8.3.0 through 8.3.2 file management AP script download webUI page allows an authenticated admin user to execute arbitrary system console commands via crafted HTTP requests.
References
Link Resource
http://www.securityfocus.com/bid/101273 Third Party Advisory VDB Entry
https://fortiguard.com/psirt/FG-IR-17-119 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-10-26 13:29

Updated : 2024-02-04 19:29


NVD link : CVE-2017-7341

Mitre link : CVE-2017-7341

CVE.ORG link : CVE-2017-7341


JSON object : View

Products Affected

fortinet

  • fortiwlc
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')