Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 12 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sangfor
Sangfor operation And Maintenance Security Management System |
|
| Vendors & Products |
Sangfor
Sangfor operation And Maintenance Security Management System |
Fri, 09 Jan 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Sangfor Operation and Maintenance Management System up to 3.0.8. Impacted is the function WriterHandle.getCmd of the file /isomp-protocol/protocol/getCmd. This manipulation of the argument sessionPath causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Sangfor Operation and Maintenance Management System getCmd WriterHandle.getCmd os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-01-12T19:14:37.055Z
Reserved: 2026-01-09T17:12:05.995Z
Link: CVE-2025-15501
Updated: 2026-01-12T19:14:33.999Z
Status : Awaiting Analysis
Published: 2026-01-09T23:15:54.773
Modified: 2026-01-13T14:03:46.203
Link: CVE-2025-15501
No data.
OpenCVE Enrichment
Updated: 2026-01-12T14:37:00Z