CVE-2021-22126
Severity CVSS v4.0:
Pending analysis
Type:
CWE-284
Improper Access Control
Publication date:
17/03/2025
Last modified:
24/07/2025
Description
A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.
Impact
Base Score 3.x
6.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:* | 8.4.0 (including) | 8.5.3 (excluding) |
| cpe:2.3:a:fortinet:fortiwlc:8.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:fortinet:fortiwlc:8.2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:fortinet:fortiwlc:8.3.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



