Description
Unrestricted Upload of File with Dangerous Type vulnerability in Hillstone Networks Operation and Maintenance Security Gateway on Linux allows Upload a Web Shell to a Web Server.This issue affects Operation and Maintenance Security Gateway: V5.5ST00001B113.
Published: 2026-02-04
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Unrestricted File Upload
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to upload files of any type to the Hillstone Networks Operation and Maintenance Security Gateway. Because the upload mechanism does not restrict file formats, a malicious user can place a web shell or other executable content on the device, leading to the execution of arbitrary code on the underlying Linux system. This represents a remote code execution vulnerability with the weakness reflected in CWE‑434 and enables the attacker to achieve full control over the device once the shell is triggered.

Affected Systems

Hillstone Networks Operation and Maintenance Security Gateway version V5.5ST00001B113 running on Linux. The flaw is present only in this exact build; no other versions were identified in the advisory.

Risk and Exploitability

The CVSS score is 2.7, indicating a low severity rating, and the EPSS score is below 1 %, showing a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. An attacker would need to reach the web management interface of the gateway, usually through an open network or compromised credentials, to place the malicious file. Once the file is uploaded, executing it grants code‑execution rights. Because the flaw resides in the file‑upload feature, the attack vector is a remote, network‑based exploitation through the web UI; no local privilege escalation or physical access is required.

Generated by OpenCVE AI on April 17, 2026 at 23:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Operation and Maintenance Security Gateway to a firmware revision that removes the unrestricted file‑upload capability or implements strict file‑type validation.
  • Restrict access to the appliance’s administration interface with IP whitelisting or VPN restrictions to limit exposure to trusted administrators.
  • If an update is delayed, disable the file‑upload feature or configure the device’s web server to reject all non‑static content types that are not required for normal operation.
  • Regularly monitor audit logs for unexpected file uploads and verify that only approved file types are present on the system.

Generated by OpenCVE AI on April 17, 2026 at 23:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 04:00:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Hillstone Networks Operation and Maintenance Security Gateway on Linux allows Upload a Web Shell to a Web Server.This issue affects Operation and Maintenance Security Gateway: V5.5ST00001B113.
Title Arbitrary File Upload Vulnerability in Operation and Maintenance Security Gateway
First Time appeared Hillstone Networks
Hillstone Networks operation And Maintenance Security Gateway
Weaknesses CWE-434
CPEs cpe:2.3:a:hillstone_networks:operation_and_maintenance_security_gateway:v5.5st00001b113:*:linux:*:*:*:*:*
Vendors & Products Hillstone Networks
Hillstone Networks operation And Maintenance Security Gateway
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Hillstone Networks Operation And Maintenance Security Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: Hillstone

Published:

Updated: 2026-02-04T20:19:45.301Z

Reserved: 2026-02-03T07:34:55.542Z

Link: CVE-2026-1791

cve-icon Vulnrichment

Updated: 2026-02-04T20:19:42.898Z

cve-icon NVD

Status : Deferred

Published: 2026-02-04T04:15:49.440

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1791

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:00:09Z

Weaknesses