Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 27 Jan 2026 04:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 21:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sangfor
Sangfor operation And Maintenance Security Management System |
|
| Vendors & Products |
Sangfor
Sangfor operation And Maintenance Security Management System |
Mon, 26 Jan 2026 11:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function portValidate of the file /fort/ip_and_port/port_validate of the component HTTP POST Request Handler. Performing a manipulation of the argument port results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used. | |
| Title | Sangfor Operation and Maintenance Security Management System HTTP POST Request port_validate portValidate command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-01-26T17:27:53.149Z
Reserved: 2026-01-25T09:50:41.203Z
Link: CVE-2026-1413
Updated: 2026-01-26T17:27:50.606Z
Status : Awaiting Analysis
Published: 2026-01-26T02:15:48.767
Modified: 2026-01-26T15:03:33.357
Link: CVE-2026-1413
No data.
OpenCVE Enrichment
Updated: 2026-01-26T20:47:58Z