First published: Wed Apr 06 2022(Updated: )
Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN before 4.5.9 may allow an unauthenticated attacker to potentially corrupt control data in memory and execute arbitrary code via specifically crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWAN | <=4.5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26112 is classified as a high severity vulnerability due to its potential to allow arbitrary code execution.
To mitigate CVE-2021-26112, upgrade FortiWAN to version 4.5.9 or later.
The vulnerabilities in CVE-2021-26112 are caused by multiple stack-based buffer overflows in network daemons and the command line interpreter.
CVE-2021-26112 affects FortiWAN versions prior to 4.5.9.
Yes, CVE-2021-26112 can be exploited by an unauthenticated attacker via specially crafted requests.