Description
A vulnerability was determined in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This impacts the function getInformation of the file /equipment/get_Information of the component HTTP POST Request Handler. Executing a manipulation of the argument fortEquipmentIp can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-01-26
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Apply Patch
AI Analysis

Impact

An attacker can exploit a command injection flaw in the getInformation function of the HTTP POST handler by manipulating the fortEquipmentIp argument. The flaw allows execution of arbitrary system commands on the underlying server, leading to full compromise of confidentiality, integrity, and availability of the affected device.

Affected Systems

Sangfor Operation and Maintenance Security Management System versions up to and including 3.0.12 are impacted. No specific service pack or build identifiers are listed beyond the major version boundary.

Risk and Exploitability

The CVSS base score of 5.3 indicates a moderate risk, but the EPSS score is below 1%, suggesting a low likelihood of exploitation in the wild. The vulnerability is not currently recorded in the CISA KEV catalog. An attacker can launch the exploit remotely via an HTTP POST request to /equipment/get_Information, making the attack straightforward for anyone with network access to the system.

Generated by OpenCVE AI on April 18, 2026 at 02:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Sangfor Operation and Maintenance Security Management System to any version newer than 3.0.12 where the command injection bug has been fixed.
  • Restrict network access to the /equipment/get_Information endpoint, for example by limiting the IP range or enforcing strict authentication before allowing POST requests.
  • Implement server-side input validation and sanitization for the fortEquipmentIp parameter to eliminate potential command injection vectors.

Generated by OpenCVE AI on April 18, 2026 at 02:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sangfor:operation_and_maintenance_security_management_system:*:*:*:*:*:*:*:*

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sangfor
Sangfor operation And Maintenance Security Management System
Vendors & Products Sangfor
Sangfor operation And Maintenance Security Management System

Mon, 26 Jan 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This impacts the function getInformation of the file /equipment/get_Information of the component HTTP POST Request Handler. Executing a manipulation of the argument fortEquipmentIp can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Title Sangfor Operation and Maintenance Security Management System HTTP POST Request get_Information getInformation command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sangfor Operation And Maintenance Security Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:55:31.161Z

Reserved: 2026-01-25T09:50:43.788Z

Link: CVE-2026-1414

cve-icon Vulnrichment

Updated: 2026-01-26T17:27:03.090Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T03:15:49.587

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1414

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:00:10Z

Weaknesses