PT-2026-3932 · Sangfor · Sangfor Operation/Maintenance Management System

Linxi666

·

Published

2026-01-22

·

Updated

2026-01-30

·

CVE-2026-1324

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Sangfor Operation and Maintenance Management System versions up to 3.0.12
Description A flaw exists in Sangfor Operation and Maintenance Management System. This issue is related to the
SessionController
function within the SSH Protocol Handler component, specifically in the file
/isomp-protocol/protocol/session
. Manipulation of the
keypassword
argument can lead to operating system command injection. The attack can be initiated remotely. A publicly available exploit exists. The vendor was contacted regarding this disclosure but did not respond.
Recommendations Versions prior to 3.0.12 should be updated. As a temporary workaround, consider restricting access to the
SessionController
function until a patch is available.

Exploit

Fix

OS Command Injection

Command Injection

Weakness Enumeration

Related Identifiers

CVE-2026-1324

Affected Products

Sangfor Operation/Maintenance Management System