A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, version 3.1.4 and below may allow an authenticated attacker to potentially execute unauthorized code or commands via specifically crafted HTTP requests.
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-20-234 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Jul 2025, 19:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-20-234 - Vendor Advisory | |
| First Time |
Fortinet fortisandbox
Fortinet |
|
| CWE | CWE-787 | |
| CPE | cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:* |
27 Mar 2025, 16:44
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
24 Mar 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-24 16:15
Updated : 2025-07-24 19:18
NVD link : CVE-2021-26105
Mitre link : CVE-2021-26105
CVE.ORG link : CVE-2021-26105
JSON object : View
Products Affected
fortinet
- fortisandbox
