CVE-2021-26105

A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, version 3.1.4 and below may allow an authenticated attacker to potentially execute unauthorized code or commands via specifically crafted HTTP requests.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*

History

24 Jul 2025, 19:18

Type Values Removed Values Added
First Time Fortinet fortisandbox
Fortinet
CWE CWE-787
References () https://fortiguard.fortinet.com/psirt/FG-IR-20-234 - () https://fortiguard.fortinet.com/psirt/FG-IR-20-234 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*

24 Mar 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-24 16:15

Updated : 2025-07-24 19:18


NVD link : CVE-2021-26105

Mitre link : CVE-2021-26105


JSON object : View

Products Affected

fortinet

  • fortisandbox
CWE
CWE-787

Out-of-bounds Write

CWE-358

Improperly Implemented Security Check for Standard