PSIRT Advisories

FortiWLC file management OS Command Injection vulnerability


The FortiWLC file management AP script download webUI page is affected by an OS Command Injection vulnerability which may allow an authenticated admin user to execute arbitrary system console commands, and possibly subsequently "root" the device.

Affected Products

FortiWLC 6.1-2 -> 6.1-5

FortiWLC 7.0-7 -> 7.0-10

FortiWLC 8.0 -> 8.2

FortiWLC 8.3.0 -> 8.3.2


For FortiWLC 7.x branch, upgrade to 7.0.11 or newer versions.

For FortiWLC 8.x branch, upgrade to 8.3.3 or newer versions.


Fortinet is pleased to thank Tom Scholten, SOLIDBE B.V. for reporting this vulnerability under responsible disclosure.