Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hj59-mf6x-2j8w

Опубликовано: 10 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 8.9
CVSS3: 9.8

Описание

A vulnerability was determined in Sangfor Operation and Maintenance Management System up to 3.0.8. Impacted is the function WriterHandle.getCmd of the file /isomp-protocol/protocol/getCmd. This manipulation of the argument sessionPath causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability was determined in Sangfor Operation and Maintenance Management System up to 3.0.8. Impacted is the function WriterHandle.getCmd of the file /isomp-protocol/protocol/getCmd. This manipulation of the argument sessionPath causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 78%
0.011
Низкий

8.9 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-77
CWE-78

Связанные уязвимости

CVSS3: 9.8
nvd
29 дней назад

A vulnerability was determined in Sangfor Operation and Maintenance Management System up to 3.0.8. Impacted is the function WriterHandle.getCmd of the file /isomp-protocol/protocol/getCmd. This manipulation of the argument sessionPath causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 78%
0.011
Низкий

8.9 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-77
CWE-78