5 min read
By: RedLegg's Cyber Threat Intelligence Team
About:
CVE-2026-39808 is a critical OS command injection vulnerability in the FortiSandbox API caused by improper neutralization of special elements used in system commands.
An attacker can exploit this flaw by sending specially crafted requests to vulnerable API endpoints. Successful exploitation may allow execution of arbitrary commands on the FortiSandbox appliance, potentially leading to full compromise of the system and analysis infrastructure.
Public proof-of-concept details have been published, increasing the likelihood of exploitation.
RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.
VULNERABILITIES
OS Command Injection Vulnerability in Fortinet FortiSandbox
Identifier: CVE-2026-39808
CVSS Score: 9.1 (Critical, CVSS v3.0 – Fortinet advisory)
PoC or Exploitation:
Update/ Patch:
- FortiSandbox 4.4.0 through 4.4.8
- FortiSandbox 4.4.9 and later
- FortiSandbox 5.0
- FortiSandbox PaaS 5.0
An attacker can exploit this vulnerability by sending crafted requests to the affected API endpoint. Successful exploitation may allow execution of arbitrary commands on the FortiSandbox appliance.
Mitigation Recommendation: