CVE-2021-22126

A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.2.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*

History

24 Jul 2025, 20:16

Type Values Removed Values Added
First Time Fortinet fortiwlc
Fortinet
CWE CWE-798
CPE cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.2.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:*
References () https://fortiguard.fortinet.com/psirt/FG-IR-20-147 - () https://fortiguard.fortinet.com/psirt/FG-IR-20-147 - Vendor Advisory

17 Mar 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-17 14:15

Updated : 2025-07-24 20:16


NVD link : CVE-2021-22126

Mitre link : CVE-2021-22126


JSON object : View

Products Affected

fortinet

  • fortiwlc
CWE
CWE-798

Use of Hard-coded Credentials

CWE-284

Improper Access Control