OS Command Injection in Sangfor Operation and Maintenance Management System
CVE-2025-15502
What is CVE-2025-15502?
A significant OS command injection vulnerability has been identified in Sangfor's Operation and Maintenance Management System prior to version 3.0.8. Specifically, the flaw resides in the SessionController function located within the /isomp-protocol/protocol/session file. Attackers can exploit this vulnerability remotely by manipulating the Hostname parameter, potentially executing arbitrary commands on the underlying operating system. Current indications suggest that exploit code is publicly available, highlighting the urgent need for remediation. The vendor has been notified of this issue but has not yet responded.
Affected Version(s)
Operation and Maintenance Management System 3.0.0
Operation and Maintenance Management System 3.0.1
Operation and Maintenance Management System 3.0.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
