An OS Command Injection vulnerability in Fortinet FortiWLC 6.1-2 through 6.1-5, 7.0-7 through 7.0-10, 8.0 through 8.2, and 8.3.0 through 8.3.2 file management AP script download webUI page allows an authenticated admin user to execute arbitrary system console commands via crafted HTTP requests.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-16368 | An OS Command Injection vulnerability in Fortinet FortiWLC 6.1-2 through 6.1-5, 7.0-7 through 7.0-10, 8.0 through 8.2, and 8.3.0 through 8.3.2 file management AP script download webUI page allows an authenticated admin user to execute arbitrary system console commands via crafted HTTP requests. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 25 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T14:33:30.845Z
Reserved: 2017-03-30T00:00:00
Link: CVE-2017-7341
Updated: 2024-08-05T15:56:36.482Z
Status : Deferred
Published: 2017-10-26T13:29:00.370
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-7341
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD