Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Upgrade to FortiSandbox 4.0.1 or above. Upgrade to FortiSandbox 3.2.3 or above.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-12926 | A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, version 3.1.4 and below may allow an authenticated attacker to potentially execute unauthorized code or commands via specifically crafted HTTP requests. |
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-20-234 |
|
Thu, 24 Jul 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:* |
Mon, 31 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Mar 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, version 3.1.4 and below may allow an authenticated attacker to potentially execute unauthorized code or commands via specifically crafted HTTP requests. | |
| Weaknesses | CWE-358 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-31T18:19:39.502Z
Reserved: 2021-01-25T14:47:15.095Z
Link: CVE-2021-26105
Updated: 2025-03-31T18:19:35.535Z
Status : Analyzed
Published: 2025-03-24T16:15:16.610
Modified: 2025-07-24T19:18:02.290
Link: CVE-2021-26105
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:23:17Z
EUVD