Unauthenticated Remote Code Execution in Weaver E-cology 10.0
CVE-2026-22679
Key Information:
- Vendor
Weaver Network Co., Ltd.
- Status
- Vendor
- CVE Published:
- 7 April 2026
Badges
What is CVE-2026-22679?
Weaver E-cology 10.0 prior to version 20260312 is exposed to an unauthenticated remote code execution vulnerability. This occurs in the /papi/esearch/data/devops/dubboApi/debug/method endpoint, which allows malicious actors to execute arbitrary commands. By crafting specific POST requests with attacker-controlled parameters, an attacker can exploit the debug functionality to gain unauthorized access and run commands on the system. The vulnerability was first identified on March 31, 2026, raising significant concerns regarding the security posture of affected installations.
Affected Version(s)
E-cology 0 < 20260312
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
