Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 27 Jan 2026 04:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 21:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sangfor
Sangfor operation And Maintenance Security Management System |
|
| Vendors & Products |
Sangfor
Sangfor operation And Maintenance Security Management System |
Mon, 26 Jan 2026 10:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Sangfor Operation and Maintenance Security Management System up to 3.0.12. The impacted element is an unknown function of the file /fort/audit/get_clip_img of the component HTTP POST Request Handler. Such manipulation of the argument frame/dirno leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Sangfor Operation and Maintenance Security Management System HTTP POST Request get_clip_img command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-01-26T17:28:19.803Z
Reserved: 2026-01-25T09:50:36.992Z
Link: CVE-2026-1412
Updated: 2026-01-26T17:28:17.420Z
Status : Awaiting Analysis
Published: 2026-01-26T01:15:49.570
Modified: 2026-01-26T15:03:33.357
Link: CVE-2026-1412
No data.
OpenCVE Enrichment
Updated: 2026-01-26T20:47:56Z