A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, version 3.1.4 and below may allow an authenticated attacker to potentially execute unauthorized code or commands via specifically crafted HTTP requests.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-20-234 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Jul 2025, 19:18
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fortinet fortisandbox
Fortinet |
|
CWE | CWE-787 | |
References | () https://fortiguard.fortinet.com/psirt/FG-IR-20-234 - Vendor Advisory | |
CPE | cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:* |
27 Mar 2025, 16:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-24 16:15
Updated : 2025-07-24 19:18
NVD link : CVE-2021-26105
Mitre link : CVE-2021-26105
CVE.ORG link : CVE-2021-26105
JSON object : View
Products Affected
fortinet
- fortisandbox