A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.
2025-03-17T14:15:17.067
2025-07-24T20:16:08.390
Analyzed
CVSSv3.1: 6.7 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | fortinet | fortiwlc | < 8.5.3 | Yes |
Application | fortinet | fortiwlc | 8.2.6 | Yes |
Application | fortinet | fortiwlc | 8.2.7 | Yes |
Application | fortinet | fortiwlc | 8.3.2 | Yes |
Application | fortinet | fortiwlc | 8.3.3 | Yes |