Improper Input Validation in FortiWAN Web GUI Allows Command Execution
CVE-2021-24009
7.2HIGH
Summary
Multiple instances of improper input validation in the Web GUI of FortiWAN before version 4.5.9 create vulnerabilities that allow an authenticated attacker to inject and execute arbitrary OS commands. This can be achieved through specially crafted HTTP requests that exploit these weaknesses, potentially compromising the underlying system.
Affected Version(s)
Fortinet FortiWAN FortiWAN before 4.5.9
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved