Vulnerability Details CVE-2021-43075
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.2 and below, version 8.5.2 and below, version 8.4.2 and below, version 8.3.2 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to the alarm dashboard and controller config handlers.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.016
EPSS Ranking 80.9%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 9.0
Products affected by CVE-2021-43075
-
cpe:2.3:a:fortinet:fortiwlm:8.2.2
-
cpe:2.3:a:fortinet:fortiwlm:8.2.4
-
cpe:2.3:a:fortinet:fortiwlm:8.3.0
-
cpe:2.3:a:fortinet:fortiwlm:8.3.1
-
cpe:2.3:a:fortinet:fortiwlm:8.3.2
-
cpe:2.3:a:fortinet:fortiwlm:8.4.0
-
cpe:2.3:a:fortinet:fortiwlm:8.4.1
-
cpe:2.3:a:fortinet:fortiwlm:8.4.2
-
cpe:2.3:a:fortinet:fortiwlm:8.5.0
-
cpe:2.3:a:fortinet:fortiwlm:8.5.1
-
cpe:2.3:a:fortinet:fortiwlm:8.5.2
-
cpe:2.3:a:fortinet:fortiwlm:8.6.0
-
cpe:2.3:a:fortinet:fortiwlm:8.6.1
-
cpe:2.3:a:fortinet:fortiwlm:8.6.2