Fortinet Fortiwlc vulnerabilities
14 known vulnerabilities affecting fortinet/fortiwlc.
Total CVEs
14
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL4HIGH3MEDIUM7
Vulnerabilities
Page 1 of 1
CVE-2021-26087MEDIUMCVSS 6.1≥ 8.4.0, ≤ 8.4.2≥ 8.4.4, < 8.5.4+4 more2025-03-17
CVE-2021-26087 [MEDIUM] CWE-79 CVE-2021-26087: An improper neutralization of input during web page generation in FortiWLC version 8.6.0, version 8.
An improper neutralization of input during web page generation in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 web interface may allow both authenticated remote attackers and non-authenticated attackers in the same network as the appliance to perform a stored cross site scripting attack (XSS) via injecting m
cvelistv5nvd
CVE-2021-32584MEDIUMCVSS 5.3≥ 8.1.3, < 8.5.4v8.6.0+6 more2025-03-17
CVE-2021-32584 [MEDIUM] CWE-284 CVE-2021-32584: An improper access control (CWE-284) vulnerability in FortiWLC version 8.6.0, version 8.5.3 and belo
An improper access control (CWE-284) vulnerability in FortiWLC version 8.6.0, version 8.5.3 and below, version 8.4.8 and below, version 8.3.3 and below, version 8.2.7 to 8.2.4, version 8.1.3 may allow an unauthenticated and remote attacker to access certain areas of the web management CGI functionality by just specifying the correct URL. The vulnera
cvelistv5nvd
CVE-2021-22126MEDIUMCVSS 6.7≥ 8.4.0, < 8.5.3v8.2.6+8 more2025-03-17
CVE-2021-22126 [MEDIUM] CWE-284 CVE-2021-22126: A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and be
A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.
cvelistv5nvd
CVE-2022-23439MEDIUMCVSS 6.1≥ 8.6.0, < 8.6.7≥ 8.6.0, ≤ 8.6.7+3 more2025-01-22
CVE-2022-23439 [MEDIUM] CWE-610 CVE-2022-23439: A externally controlled reference to a resource in another sphere vulnerability in Fortinet allows
A externally controlled reference to a resource in another sphere vulnerability in Fortinet allows attacker to poison web caches via crafted HTTP requests, where the `Host` header points to an arbitrary webserver
cvelistv5nvd
CVE-2021-26093MEDIUMCVSS 6.5≥ 8.0.6, < 8.6.3v8.6.0+7 more2024-12-19
CVE-2021-26093 [HIGH] CWE-824 CVE-2021-26093: An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and ear
An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command.
cvelistv5nvd
CVE-2021-42758HIGHCVSS 8.8≥ 8.2.4, ≤ 8.2.7≥ 8.3.0, ≤ 8.3.3+15 more2021-12-08
CVE-2021-42758 [HIGH] CWE-863 CVE-2021-42758: An improper access control vulnerability [CWE-284] in FortiWLC 8.6.1 and below may allow an authenti
An improper access control vulnerability [CWE-284] in FortiWLC 8.6.1 and below may allow an authenticated and remote attacker with low privileges to execute any command as an admin user with full access rights via bypassing the GUI restrictions.
nvd
CVE-2020-9288MEDIUMCVSS 5.4≤ 8.5.12020-06-22
CVE-2020-9288 [MEDIUM] CWE-79 CVE-2020-9288: An improper neutralization of input vulnerability in FortiWLC 8.5.1 allows a remote authenticated at
An improper neutralization of input vulnerability in FortiWLC 8.5.1 allows a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the ESS profile or the Radius Profile.
nvd
CVE-2017-17539CRITICALCVSS 9.8≥ 7.0, ≤ 7.0.11≥ 8.0, ≤ 8.3.32018-05-08
CVE-2017-17539 [CRITICAL] CWE-798 CVE-2017-17539: The presence of a hardcoded account in Fortinet FortiWLC 7.0.11 and earlier allows attackers to gain
The presence of a hardcoded account in Fortinet FortiWLC 7.0.11 and earlier allows attackers to gain unauthorized read/write access via a remote shell.
nvd
CVE-2017-17540CRITICALCVSS 9.8≥ 7.0, ≤ 7.0.11≥ 8.0, ≤ 8.3.32018-05-08
CVE-2017-17540 [CRITICAL] CWE-798 CVE-2017-17540: The presence of a hardcoded account in Fortinet FortiWLC 8.3.3 allows attackers to gain unauthorized
The presence of a hardcoded account in Fortinet FortiWLC 8.3.3 allows attackers to gain unauthorized read/write access via a remote shell.
nvd
CVE-2017-7341HIGHCVSS 7.2≥ 6.1-2, ≤ 6.1-5≥ 7.0-7, ≤ 7.0-10+2 more2017-10-26
CVE-2017-7341 [HIGH] CWE-78 CVE-2017-7341: An OS Command Injection vulnerability in Fortinet FortiWLC 6.1-2 through 6.1-5, 7.0-7 through 7.0-10
An OS Command Injection vulnerability in Fortinet FortiWLC 6.1-2 through 6.1-5, 7.0-7 through 7.0-10, 8.0 through 8.2, and 8.3.0 through 8.3.2 file management AP script download webUI page allows an authenticated admin user to execute arbitrary system console commands via crafted HTTP requests.
nvd
CVE-2017-7335MEDIUMCVSS 5.4v6.1-2v6.1-4+11 more2017-10-26
CVE-2017-7335 [MEDIUM] CWE-79 CVE-2017-7335: A Cross-Site Scripting (XSS) vulnerability in Fortinet FortiWLC 6.1-x (6.1-2, 6.1-4 and 6.1-5); 7.0-
A Cross-Site Scripting (XSS) vulnerability in Fortinet FortiWLC 6.1-x (6.1-2, 6.1-4 and 6.1-5); 7.0-x (7.0-7, 7.0-8, 7.0-9, 7.0-10); and 8.x (8.0, 8.1, 8.2 and 8.3.0-8.3.2) allows an authenticated user to inject arbitrary web script or HTML via non-sanitized parameters "refresh" and "branchtotable" present in HTTP POST requests.
nvd
CVE-2016-8491CRITICALCVSS 9.1v7.0-9-1v7.0-10-0+3 more2017-02-01
CVE-2016-8491 [CRITICAL] CWE-798 CVE-2016-8491: The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unaut
The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell.
nvd
CVE-2016-7560CRITICALCVSS 9.8≤ 6.1-2-29v7.0-9-1+4 more2016-10-05
CVE-2016-7560 [CRITICAL] CWE-798 CVE-2016-7560: The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, an
The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 has a hardcoded rsync account, which allows remote attackers to read or write to arbitrary files via unspecified vectors.
nvd
CVE-2016-7561HIGHCVSS 7.2≤ 6.1-2-29v7.0-9-1+4 more2016-10-05
CVE-2016-7561 [HIGH] CWE-200 CVE-2016-7561: Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow admin
Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow administrators to obtain sensitive user credentials by reading the pam.log file.
nvd