Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Please upgrade to FortiWLC versions 8.6.0 or above. Please upgrade to FortiWLC versions 8.5.3 or above.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-9282 | A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password. |
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-20-147 |
|
Thu, 24 Jul 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-798 | |
| CPEs | cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:* |
Mon, 17 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 17 Mar 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password. | |
| First Time appeared |
Fortinet
Fortinet fortiwlc |
|
| Weaknesses | CWE-284 | |
| CPEs | cpe:2.3:a:fortinet:fortiwlc:8.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.2.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.4.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlc:8.5.2:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortiwlc |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-02-26T19:09:28.871Z
Reserved: 2021-01-04T20:14:12.302Z
Link: CVE-2021-22126
Updated: 2025-03-17T13:36:28.155Z
Status : Analyzed
Published: 2025-03-17T14:15:17.067
Modified: 2025-07-24T20:16:08.390
Link: CVE-2021-22126
No data.
OpenCVE Enrichment
No data.
EUVD