Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*", "matchCriteriaId": "32B5AEE4-D578-49CB-82B8-BB234EC09F82", "versionEndIncluding": "6.1-5", "versionStartIncluding": "6.1-2", "vulnerable": true}, {"criteria": "cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*", "matchCriteriaId": "C743E7EB-4C55-482D-B39A-51EF4E1AF19E", "versionEndIncluding": "7.0-10", "versionStartIncluding": "7.0-7", "vulnerable": true}, {"criteria": "cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*", "matchCriteriaId": "6413A393-8FFC-46BC-92F1-DEA776815122", "versionEndIncluding": "8.2", "versionStartIncluding": "8.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5210AB0C-6778-42D9-8353-ABD2E4C1C2AB", "versionEndIncluding": "8.3.2", "versionStartIncluding": "8.3.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "An OS Command Injection vulnerability in Fortinet FortiWLC 6.1-2 through 6.1-5, 7.0-7 through 7.0-10, 8.0 through 8.2, and 8.3.0 through 8.3.2 file management AP script download webUI page allows an authenticated admin user to execute arbitrary system console commands via crafted HTTP requests."}, {"lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de comandos de sistema operativo en la interfaz de usuario web para la descarga de scripts en el punto de acceso al gestor de archivo ene Fortinet FortiWLC, desde la versi\u00f3n 6.1-2 hasta la 6.1-5, desde la 7.0-7 hasta la 7.0-10, la 8.0 hasta la 8.2 y la 8.3.0 hasta la 8.3.2 permite que un usuario administrador autenticado ejecute comandos arbitrarios de la consola del sistema mediante peticiones HTTP manipuladas."}], "id": "CVE-2017-7341", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-10-26T13:29:00.370", "references": [{"source": "psirt@fortinet.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/101273"}, {"source": "psirt@fortinet.com", "tags": ["Vendor Advisory"], "url": "https://fortiguard.com/psirt/FG-IR-17-119"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/101273"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://fortiguard.com/psirt/FG-IR-17-119"}], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-78"}], "source": "nvd@nist.gov", "type": "Primary"}]}