Executive Risk Summary
"A vulnerability in Fortinet FortiWLM versions 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows an attacker to execute unauthorized code or commands via specifically crafted HTTP GET request parameters, potentially leading to system compromise. This vulnerability can be exploited by sending a malicious HTTP request to the affected system, highlighting the need for immediate patching or mitigation."
Operational Audit Arsenal
Manual Verification Required
This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.
Patch Impact Forecast
Moderate
Internal Work Notes
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Scope of Impact
Original NVD Description
"A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters."