Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN before 4.5.9 may allow an unauthenticated attacker to potentially corrupt control data in memory and execute arbitrary code via specifically crafted requests.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-21-065 | Patch Vendor Advisory |
Configurations
History
13 Apr 2022, 18:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:fortiwan:*:*:*:*:*:*:*:* | |
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
References | (CONFIRM) https://fortiguard.com/psirt/FG-IR-21-065 - Patch, Vendor Advisory |
06 Apr 2022, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-06 10:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-26112
Mitre link : CVE-2021-26112
CVE.ORG link : CVE-2021-26112
JSON object : View
Products Affected
fortinet
- fortiwan
CWE
CWE-787
Out-of-bounds Write