Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] vulnerability in Fortinet allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-30035 Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] in Fortinet FortiADCManager version 7.1.0 and before 7.0.0, FortiADC version 7.2.0 and before 7.1.2 allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests.
Fixes

Solution

Please upgrade to FortiADC version 7.2.1 or above Please upgrade to FortiADC version 7.1.3 or above Please upgrade to FortiADCManager version 7.2.0 or above Please upgrade to FortiADCManager version 7.1.1 or above Please upgrade to FortiADCManager version 7.0.1 or above


Workaround

No workaround given by the vendor.

References
History

Wed, 14 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
Description Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] in Fortinet FortiADCManager version 7.1.0 and before 7.0.0, FortiADC version 7.2.0 and before 7.1.2 allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests. Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] vulnerability in Fortinet allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests.
First Time appeared Fortinet fortiadcmanager
CPEs cpe:2.3:h:fortinet:fortiadc:5.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.7:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.2.8:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.7:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:5.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:5.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:5.3.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:5.4.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:6.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:6.1.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:6.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:6.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:7.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadcmanager:7.1.0:*:*:*:*:*:*:*
Vendors & Products Fortinet fortiadcmanager
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:C'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:X/RC:C'}


Wed, 23 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-01-14T14:15:28.898Z

Reserved: 2023-02-20T15:09:20.637Z

Link: CVE-2023-26210

cve-icon Vulnrichment

Updated: 2024-08-02T11:46:23.415Z

cve-icon NVD

Status : Modified

Published: 2023-06-13T09:15:16.510

Modified: 2026-01-14T15:15:53.513

Link: CVE-2023-26210

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses