CVE-2021-26105

A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, version 3.1.4 and below may allow an authenticated attacker to potentially execute unauthorized code or commands via specifically crafted HTTP requests.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*

History

24 Jul 2025, 19:18

Type Values Removed Values Added
First Time Fortinet fortisandbox
Fortinet
CWE CWE-787
References () https://fortiguard.fortinet.com/psirt/FG-IR-20-234 - () https://fortiguard.fortinet.com/psirt/FG-IR-20-234 - Vendor Advisory
CPE cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*

27 Mar 2025, 16:44

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de desbordamiento de búfer basada en pila (CWE-121) en el analizador de perfiles de FortiSandbox versión 3.2.2 y anteriores, versión 3.1.4 y anteriores puede permitir que un atacante autenticado potencialmente ejecute código o comandos no autorizados a través de solicitudes HTTP específicamente manipuladas.

24 Mar 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-24 16:15

Updated : 2025-07-24 19:18


NVD link : CVE-2021-26105

Mitre link : CVE-2021-26105

CVE.ORG link : CVE-2021-26105


JSON object : View

Products Affected

fortinet

  • fortisandbox
CWE
CWE-358

Improperly Implemented Security Check for Standard

CWE-787

Out-of-bounds Write