CVE-2021-26112

Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN before 4.5.9 may allow an unauthenticated attacker to potentially corrupt control data in memory and execute arbitrary code via specifically crafted requests.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-21-065 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:fortinet:fortiwan:*:*:*:*:*:*:*:*

History

13 Apr 2022, 18:46

Type Values Removed Values Added
CPE cpe:2.3:a:fortinet:fortiwan:*:*:*:*:*:*:*:*
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
References (CONFIRM) https://fortiguard.com/psirt/FG-IR-21-065 - (CONFIRM) https://fortiguard.com/psirt/FG-IR-21-065 - Patch, Vendor Advisory

06 Apr 2022, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-06 10:15

Updated : 2024-02-04 22:29


NVD link : CVE-2021-26112

Mitre link : CVE-2021-26112

CVE.ORG link : CVE-2021-26112


JSON object : View

Products Affected

fortinet

  • fortiwan
CWE
CWE-787

Out-of-bounds Write