Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Please upgrade to FortiWeb version 7.4.2 or above Please upgrade to FortiWeb version 7.2.8 or above
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19372 | A stack-based buffer overflow in Fortinet FortiWeb versions 7.2.0 through 7.2.7, and 7.4.0 through 7.4.1 may allow a privileged user to execute arbitrary code via specially crafted CLI commands, provided the user is able to evade FortiWeb stack protections. |
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-23-458 |
|
Thu, 24 Jul 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:* |
Tue, 18 Feb 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-120 |
Tue, 14 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-120 | |
| Metrics |
ssvc
|
Tue, 14 Jan 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow in Fortinet FortiWeb versions 7.2.0 through 7.2.7, and 7.4.0 through 7.4.1 may allow a privileged user to execute arbitrary code via specially crafted CLI commands, provided the user is able to evade FortiWeb stack protections. | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-02-18T21:38:54.103Z
Reserved: 2024-01-02T10:15:00.526Z
Link: CVE-2024-21758
Updated: 2025-01-14T14:32:10.845Z
Status : Analyzed
Published: 2025-01-14T14:15:28.597
Modified: 2025-07-24T19:59:23.743
Link: CVE-2024-21758
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:31:11Z
EUVD