CVE-2021-26105

Severity
8.8HIGH
EPSS
0.2%
top 57.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 24

Description

A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, version 3.1.4 and below may allow an authenticated attacker to potentially execute unauthorized code or commands via specifically crafted HTTP requests.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 1.6 | Impact: 5.2

Affected Packages2 packages

NVDfortinet/fortisandbox3.2.03.2.3+2
CVEListV5fortinet/fortisandbox3.1.4, 3.2.2+1

🔴Vulnerability Details

2
CVEList
CVE-2021-26105: A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 32025-03-24
GHSA
GHSA-p7mf-j4fj-4rq3: A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 32025-03-24

📋Vendor Advisories

1
Fortinet
A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, ver...2025-03-24
CVE-2021-26105 (HIGH CVSS 8.8) | A stack-based buffer overflow vulne | cvebase.io