CVE-2017-7341

An OS Command Injection vulnerability in Fortinet FortiWLC 6.1-2 through 6.1-5, 7.0-7 through 7.0-10, 8.0 through 8.2, and 8.3.0 through 8.3.2 file management AP script download webUI page allows an authenticated admin user to execute arbitrary system console commands via crafted HTTP requests.
References
Link Resource
http://www.securityfocus.com/bid/101273 Third Party Advisory VDB Entry
https://fortiguard.com/psirt/FG-IR-17-119 Vendor Advisory
http://www.securityfocus.com/bid/101273 Third Party Advisory VDB Entry
https://fortiguard.com/psirt/FG-IR-17-119 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:31

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/101273 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101273 - Third Party Advisory, VDB Entry
References () https://fortiguard.com/psirt/FG-IR-17-119 - Vendor Advisory () https://fortiguard.com/psirt/FG-IR-17-119 - Vendor Advisory

Information

Published : 2017-10-26 13:29

Updated : 2024-11-21 03:31


NVD link : CVE-2017-7341

Mitre link : CVE-2017-7341

CVE.ORG link : CVE-2017-7341


JSON object : View

Products Affected

fortinet

  • fortiwlc
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')