CVE-2017-7341

An OS Command Injection vulnerability in Fortinet FortiWLC 6.1-2 through 6.1-5, 7.0-7 through 7.0-10, 8.0 through 8.2, and 8.3.0 through 8.3.2 file management AP script download webUI page allows an authenticated admin user to execute arbitrary system console commands via crafted HTTP requests.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-17-119 Vendor Advisory
http://www.securityfocus.com/bid/101273 Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*

Information

Published : 2017-10-26 06:29

Updated : 2019-10-02 17:03


NVD link : CVE-2017-7341

Mitre link : CVE-2017-7341


JSON object : View

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Advertisement

dedicated server usa

Products Affected

fortinet

  • fortiwlc