A relative path traversal vulnerability (CWE-23) in FortiWAN version 4.5.7 and below, 4.4 all versions may allow a remote non-authenticated attacker to delete files on the system by sending a crafted POST request. In particular, deleting specific configuration files will reset the Admin password to its default value.
Advisories

No advisories yet.

Fixes

Solution

Please upgrade to FortiWAN version 4.5.8 or above Please upgrade to AscenLink version 7.2.24 or above


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.11353}

epss

{'score': 0.1258}


Tue, 21 Jan 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet fortiwan
Weaknesses CWE-22
CPEs cpe:2.3:a:fortinet:fortiwan:*:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiwan

Thu, 19 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Dec 2024 14:00:00 +0000

Type Values Removed Values Added
Description A relative path traversal vulnerability (CWE-23) in FortiWAN version 4.5.7 and below, 4.4 all versions may allow a remote non-authenticated attacker to delete files on the system by sending a crafted POST request. In particular, deleting specific configuration files will reset the Admin password to its default value.
Weaknesses CWE-305
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:U/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-12-19T15:17:08.639Z

Reserved: 2021-01-25T14:47:15.095Z

Link: CVE-2021-26102

cve-icon Vulnrichment

Updated: 2024-12-19T15:16:21.331Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-19T14:15:05.380

Modified: 2025-01-21T20:29:43.850

Link: CVE-2021-26102

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.