10 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

17 Mar 2025 — A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password. • https://fortiguard.fortinet.com/psirt/FG-IR-20-147 • CWE-284: Improper Access Control •

CVSS: 6.4EPSS: 0%CPEs: 7EXPL: 0

17 Mar 2025 — An improper access control (CWE-284) vulnerability in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 and below, version 8.2.7 to 8.2.4, version 8.1.3 may allow an unauthenticated and remote attacker to access certain areas of the web management CGI functionality by just specifying the correct URL. The vulnerability applies only to limited CGI resources and might allow the unauthorized party to access configuration details. • https://fortiguard.fortinet.com/psirt/FG-IR-20-138 • CWE-284: Improper Access Control •

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

17 Mar 2025 — An improper neutralization of input during web page generation in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 web interface may allow both authenticated remote attackers and non-authenticated attackers in the same network as the appliance to perform a stored cross site scripting attack (XSS) via injecting malicious payloads in different locations. • https://fortiguard.fortinet.com/psirt/FG-IR-20-137 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.3EPSS: 0%CPEs: 8EXPL: 0

19 Dec 2024 — An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command. An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command. • https://fortiguard.com/psirt/FG-IR-21-002 • CWE-824: Access of Uninitialized Pointer •

CVSS: 9.0EPSS: 0%CPEs: 17EXPL: 0

08 Dec 2021 — An improper access control vulnerability [CWE-284] in FortiWLC 8.6.1 and below may allow an authenticated and remote attacker with low privileges to execute any command as an admin user with full access rights via bypassing the GUI restrictions. Una vulnerabilidad de control de acceso inapropiado [CWE-284] en FortiWLC versiones 8.6.1 y posteriores, puede permitir a un atacante autenticado y remoto con bajos privilegios ejecutar cualquier comando como usuario administrador con plenos derechos de acceso por m... • https://fortiguard.com/advisory/FG-IR-21-200 • CWE-863: Incorrect Authorization •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

22 Jun 2020 — An improper neutralization of input vulnerability in FortiWLC 8.5.1 allows a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the ESS profile or the Radius Profile. Una vulnerabilidad de neutralización inapropiada de la entrada en FortiWLC versión 8.5.1, permite a un atacante autenticado remoto realizar un ataque de tipo cross site scripting (XSS) almacenado por medio del perfil ESS o el perfil Radius • https://fortiguard.com/advisory/FG-IR-20-016 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

07 May 2018 — The presence of a hardcoded account in Fortinet FortiWLC 7.0.11 and earlier allows attackers to gain unauthorized read/write access via a remote shell. La presencia de una cuenta embebida en Fortinet FortiWLC en versiones 7.0.11 y anteriores permite que atacantes obtengan acceso de lectura/escritura mediante un shell remoto. • http://www.securityfocus.com/bid/104119 • CWE-798: Use of Hard-coded Credentials •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

07 May 2018 — The presence of a hardcoded account in Fortinet FortiWLC 8.3.3 allows attackers to gain unauthorized read/write access via a remote shell. La presencia de una cuenta embebida en Fortinet FortiWLC 8.3.3 permite que atacantes obtengan acceso de lectura/escritura mediante un shell remoto. • http://www.securityfocus.com/bid/104119 • CWE-798: Use of Hard-coded Credentials •

CVSS: 5.4EPSS: 0%CPEs: 13EXPL: 0

26 Oct 2017 — A Cross-Site Scripting (XSS) vulnerability in Fortinet FortiWLC 6.1-x (6.1-2, 6.1-4 and 6.1-5); 7.0-x (7.0-7, 7.0-8, 7.0-9, 7.0-10); and 8.x (8.0, 8.1, 8.2 and 8.3.0-8.3.2) allows an authenticated user to inject arbitrary web script or HTML via non-sanitized parameters "refresh" and "branchtotable" present in HTTP POST requests. Una vulnerabilidad de Cross-Site Scripting (XSS) en Fortinet FortiWLC en versiones 6.1-x (6.1-2, 6.1-4 y 6.1-5); 7.0-x (7.0-7, 7.0-8, 7.0-9, 7.0-10); y 8.x (8.0, 8.1, 8.2 y 8.3.0-8.... • http://www.securityfocus.com/bid/101287 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 2%CPEs: 4EXPL: 0

26 Oct 2017 — An OS Command Injection vulnerability in Fortinet FortiWLC 6.1-2 through 6.1-5, 7.0-7 through 7.0-10, 8.0 through 8.2, and 8.3.0 through 8.3.2 file management AP script download webUI page allows an authenticated admin user to execute arbitrary system console commands via crafted HTTP requests. Una vulnerabilidad de inyección de comandos de sistema operativo en la interfaz de usuario web para la descarga de scripts en el punto de acceso al gestor de archivo ene Fortinet FortiWLC, desde la versión 6.1-2 hast... • http://www.securityfocus.com/bid/101273 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •