Critical severity9.8NVD Advisory· Published Oct 5, 2016· Updated May 6, 2026
CVE-2016-7560
CVE-2016-7560
Description
The rsyncd server in Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 has a hardcoded rsync account, which allows remote attackers to read or write to arbitrary files via unspecified vectors.
Affected products
6cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:fortinet:fortiwlc:*:*:*:*:*:*:*:*range: <=6.1-2-29
- cpe:2.3:a:fortinet:fortiwlc:7.0-10-0:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiwlc:7.0-9-1:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiwlc:8.0-5-0:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiwlc:8.1-2-0:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiwlc:8.2-4-0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- fortiguard.com/advisory/FG-IR-16-029nvdVendor Advisory
- www.securityfocus.com/bid/93286nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.