Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] vulnerability in Fortinet allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests.
References
History

Wed, 14 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
Description Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] in Fortinet FortiADCManager version 7.1.0 and before 7.0.0, FortiADC version 7.2.0 and before 7.1.2 allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests. Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] vulnerability in Fortinet allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests.
First Time appeared Fortinet fortiadcmanager
CPEs cpe:2.3:h:fortinet:fortiadc:5.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.7:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.8:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.7:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:5.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:5.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:5.3.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:5.4.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:6.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:6.1.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:6.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:6.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:7.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:7.1.0:*:*:*:*:*:*:*
Vendors & Products Fortinet fortiadcmanager
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:C'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:X/RC:C'}


Wed, 23 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2023-06-13T08:41:46.873Z

Updated: 2026-01-14T14:15:28.898Z

Reserved: 2023-02-20T15:09:20.637Z

Link: CVE-2023-26210

cve-icon Vulnrichment

Updated: 2024-08-02T11:46:23.415Z

cve-icon NVD

Status : Modified

Published: 2023-06-13T09:15:16.510

Modified: 2026-01-14T15:15:53.513

Link: CVE-2023-26210

cve-icon Redhat

No data.