CVE-2021-26112

Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN before 4.5.9 may allow an unauthenticated attacker to potentially corrupt control data in memory and execute arbitrary code via specifically crafted requests.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-21-065 Patch Vendor Advisory
https://fortiguard.com/psirt/FG-IR-21-065 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:fortinet:fortiwan:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:55

Type Values Removed Values Added
References () https://fortiguard.com/psirt/FG-IR-21-065 - Patch, Vendor Advisory () https://fortiguard.com/psirt/FG-IR-21-065 - Patch, Vendor Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 8.1

Information

Published : 2022-04-06 10:15

Updated : 2024-11-21 05:55


NVD link : CVE-2021-26112

Mitre link : CVE-2021-26112

CVE.ORG link : CVE-2021-26112


JSON object : View

Products Affected

fortinet

  • fortiwan
CWE
CWE-787

Out-of-bounds Write