Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN before 4.5.9 may allow an unauthenticated attacker to potentially corrupt control data in memory and execute arbitrary code via specifically crafted requests.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-21-065 | Patch Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-21-065 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 05:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-21-065 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 8.1 |
Information
Published : 2022-04-06 10:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-26112
Mitre link : CVE-2021-26112
CVE.ORG link : CVE-2021-26112
JSON object : View
Products Affected
fortinet
- fortiwan
CWE
CWE-787
Out-of-bounds Write