A stack-based buffer overflow in Fortinet FortiWeb version 6.3.14 and below, 6.2.4 and below allows attacker to execute unauthorized code or commands via crafted parameters in CLI command execution
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-22800 | A stack-based buffer overflow in Fortinet FortiWeb version 6.3.14 and below, 6.2.4 and below allows attacker to execute unauthorized code or commands via crafted parameters in CLI command execution |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://fortiguard.com/advisory/FG-IR-20-206 |
![]() ![]() |
History
Fri, 25 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:50:33.122Z
Reserved: 2021-07-06T00:00:00
Link: CVE-2021-36179

Updated: 2024-08-04T00:47:43.895Z

Status : Modified
Published: 2021-09-08T11:15:07.407
Modified: 2024-11-21T06:13:15.997
Link: CVE-2021-36179

No data.

No data.