A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, version 3.1.4 and below may allow an authenticated attacker to potentially execute unauthorized code or commands via specifically crafted HTTP requests.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-20-234 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Jul 2025, 19:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-20-234 - Vendor Advisory | |
First Time |
Fortinet
Fortinet fortisandbox |
|
CPE | cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:* |
|
CWE | CWE-787 |
27 Mar 2025, 16:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-24 16:15
Updated : 2025-07-24 19:18
NVD link : CVE-2021-26105
Mitre link : CVE-2021-26105
CVE.ORG link : CVE-2021-26105
JSON object : View
Products Affected
fortinet
- fortisandbox