Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-30805: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall

0
Critical
VulnerabilityCVE-2023-30805cvecve-2023-30805cwe-78
Published: Tue Oct 10 2023 (10/10/2023, 14:25:16 UTC)
Source: CVE Database V5
Vendor/Project: Sangfor
Product: Net-Gen Application Firewall

Description

CVE-2023-30805 is a critical OS command injection vulnerability in Sangfor Net-Gen Application Firewall version 8. 0. 17. It allows a remote, unauthenticated attacker to execute arbitrary operating system commands by sending a specially crafted HTTP POST request to the /LogInOut. php endpoint, exploiting improper neutralization of shell meta-characters in the 'un' parameter. This vulnerability has a CVSS score of 9. 8, indicating high impact on confidentiality, integrity, and availability without requiring authentication or user interaction. Although no public exploits are currently known, the ease of exploitation and critical severity make it a significant threat. European organizations using this firewall for perimeter or application security are at risk of full system compromise, data breaches, or service disruption. Immediate patching or mitigation is essential, especially in countries with higher Sangfor market presence or strategic infrastructure protected by this product.

AI-Powered Analysis

AILast updated: 11/28/2025, 16:24:07 UTC

Technical Analysis

CVE-2023-30805 is an operating system command injection vulnerability identified in Sangfor's Net-Gen Application Firewall (NGAF) version 8.0.17. The flaw arises from improper neutralization of special shell meta-characters within the 'un' parameter processed by the /LogInOut.php endpoint. An attacker can exploit this by sending a crafted HTTP POST request that injects arbitrary OS commands, which the firewall executes with system-level privileges. This vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS v3.1 base score of 9.8 reflects its critical nature, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). Successful exploitation can lead to complete compromise of the firewall device, allowing attackers to manipulate firewall rules, intercept or alter network traffic, exfiltrate sensitive data, or disrupt availability. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), a common and dangerous injection flaw. No official patches or exploit code are currently publicly available, but the risk remains high due to the straightforward exploitation method and critical impact.

Potential Impact

For European organizations, this vulnerability poses a severe risk to network security and data protection. Sangfor NGAF is often deployed as a perimeter defense or application firewall, protecting critical infrastructure and sensitive data. Exploitation could allow attackers to bypass security controls, gain persistent access, and manipulate traffic flows, potentially leading to data breaches, espionage, or ransomware deployment. The criticality is heightened for sectors such as finance, government, healthcare, and telecommunications, where firewall compromise can disrupt essential services or expose regulated data. Additionally, the lack of authentication requirement means attackers can target exposed firewall management interfaces directly from the internet. This could lead to widespread exploitation if not mitigated promptly. The impact extends to compliance risks under GDPR and other European data protection regulations due to potential unauthorized data access or leakage.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the /LogInOut.php endpoint by implementing network-level controls such as IP whitelisting or VPN-only access for management interfaces. Deploy Web Application Firewalls (WAFs) or intrusion prevention systems (IPS) with signatures or heuristics to detect and block malicious payloads targeting the 'un' parameter. Monitor firewall logs for unusual POST requests or command execution patterns. Since no official patch is currently available, consider temporarily disabling or isolating vulnerable NGAF devices from external networks until a vendor patch is released. Engage with Sangfor support for updates and apply patches as soon as they become available. Conduct thorough security audits and penetration tests to identify any signs of compromise. Additionally, implement strict network segmentation to limit the blast radius if exploitation occurs. Maintain up-to-date backups and incident response plans tailored to firewall compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2023-04-18T10:31:45.963Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6929c9154121026312b544b9

Added to database: 11/28/2025, 4:08:53 PM

Last enriched: 11/28/2025, 4:24:07 PM

Last updated: 11/28/2025, 5:38:58 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats