CVE-2026-1791

2.7 LOW

📋 TL;DR

This vulnerability allows attackers to upload malicious files to Hillstone Networks Operation and Maintenance Security Gateway, potentially enabling web shell deployment and server compromise. It affects Linux-based installations of the specified security gateway version.

💻 Affected Systems

Products:
  • Hillstone Networks Operation and Maintenance Security Gateway
Versions: V5.5ST00001B113
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific version mentioned; other versions may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via web shell leading to data exfiltration, lateral movement, and persistent backdoor access.

🟠

Likely Case

Unauthorized file upload leading to web shell installation and limited server control.

🟢

If Mitigated

File upload attempts blocked or detected with no successful exploitation.

🌐 Internet-Facing: HIGH - Web interfaces exposed to internet are directly vulnerable to file upload attacks.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the gateway.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CWE-434 vulnerabilities typically require some level of access to the upload functionality, but details about authentication requirements are not specified in the CVE description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for updated version

Vendor Advisory: https://www.hillstonenet.com.cn/security-notification/2025/12/08/wgscld/

Restart Required: Yes

Instructions:

1. Review vendor advisory at provided URL
2. Download and apply the recommended patch/update from Hillstone Networks
3. Restart the security gateway service
4. Verify the update was successful

🔧 Temporary Workarounds

Restrict File Upload Types

linux

Configure the gateway to only accept specific safe file types for upload

# Configuration depends on Hillstone gateway settings - consult documentation

Network Segmentation

all

Restrict access to the gateway's management interface to trusted networks only

# Use firewall rules to limit access to specific IP ranges

🧯 If You Can't Patch

  • Implement strict file type validation on the upload functionality
  • Monitor file upload directories for suspicious files and implement file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Check the gateway version via web interface or CLI; if version is V5.5ST00001B113, the system is vulnerable.

Check Version:

# Check via Hillstone gateway CLI or web interface - specific command varies by deployment

Verify Fix Applied:

Verify the version has been updated to a patched release as specified in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity
  • Web shell file creation in upload directories
  • Unauthorized access attempts to upload functionality

Network Indicators:

  • HTTP POST requests with file uploads to gateway endpoints
  • Suspicious outbound connections from the gateway

SIEM Query:

source="hillstone_gateway" AND (event="file_upload" OR uri="*upload*")

🔗 References

📤 Share & Export