Description
A vulnerability was found in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function portValidate of the file /fort/ip_and_port/port_validate of the component HTTP POST Request Handler. Performing a manipulation of the argument port results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used.
Published: 2026-01-26
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in a parameter handling flaw within the portValidate function of the Sangfor Operation and Maintenance Security Management System. A crafted HTTP POST request with an unvalidated "port" argument enables command injection, allowing an attacker to execute arbitrary commands on the underlying system. This can compromise confidentiality, integrity, and availability of the affected host by providing attackers with the same privileges the web service runs under. The flaw is identified as CWE-74 and CWE-77, indicating improper input validation and unsafe execution of OS commands.

Affected Systems

Sangfor Operation and Maintenance Security Management System versions up to and including 3.0.12 are affected. The vulnerability is present in the HTTP POST request handler for the /fort/ip_and_port/port_validate endpoint. No other versions or product lines are listed as affected.

Risk and Exploitability

The CVSS score of 5.3 reflects a moderate severity. An EPSS score of less than 1% suggests that, so far, exploitation attempts are rare, but a public exploit exists, implying that the vulnerability is actively available for use. The defect can be activated remotely by sending a specially crafted POST request to the portValidate endpoint. No authentication requirement is mentioned, so network access to the server is the primary prerequisite. The vulnerability is not cataloged in CISA’s KEV list, but its public exploit and command‑execution potential warrant immediate attention.

Generated by OpenCVE AI on April 18, 2026 at 02:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s latest patch or upgrade to a version newer than 3.0.12 that removes the command injection flaw.
  • If a patch is not yet available, limit network access to the /fort/ip_and_port/port_validate endpoint to trusted IP ranges or disable the endpoint entirely if the function is not required.
  • Implement input validation for the "port" parameter, ensuring that only numeric values are accepted, and remove any direct command‑execution logic that does not properly sanitize user input.

Generated by OpenCVE AI on April 18, 2026 at 02:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sangfor:operation_and_maintenance_security_management_system:*:*:*:*:*:*:*:*

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sangfor
Sangfor operation And Maintenance Security Management System
Vendors & Products Sangfor
Sangfor operation And Maintenance Security Management System

Mon, 26 Jan 2026 02:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function portValidate of the file /fort/ip_and_port/port_validate of the component HTTP POST Request Handler. Performing a manipulation of the argument port results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used.
Title Sangfor Operation and Maintenance Security Management System HTTP POST Request port_validate portValidate command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sangfor Operation And Maintenance Security Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:55:17.522Z

Reserved: 2026-01-25T09:50:41.203Z

Link: CVE-2026-1413

cve-icon Vulnrichment

Updated: 2026-01-26T17:27:50.606Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T02:15:48.767

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1413

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:00:10Z

Weaknesses