Impact
An attacker can exploit a command injection flaw in the getInformation function of the HTTP POST handler by manipulating the fortEquipmentIp argument. The flaw allows execution of arbitrary system commands on the underlying server, leading to full compromise of confidentiality, integrity, and availability of the affected device.
Affected Systems
Sangfor Operation and Maintenance Security Management System versions up to and including 3.0.12 are impacted. No specific service pack or build identifiers are listed beyond the major version boundary.
Risk and Exploitability
The CVSS base score of 5.3 indicates a moderate risk, but the EPSS score is below 1%, suggesting a low likelihood of exploitation in the wild. The vulnerability is not currently recorded in the CISA KEV catalog. An attacker can launch the exploit remotely via an HTTP POST request to /equipment/get_Information, making the attack straightforward for anyone with network access to the system.
OpenCVE Enrichment