Home

Description

Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges.

PUBLISHED Reserved 2026-02-22 | Published 2026-03-11 | Updated 2026-03-11 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-1334 Unauthorized Error Injection Can Degrade Hardware Redundancy

Product status

Default status
unaffected

*
affected

Credits

Nassim Asrir finder

References

www.exploit-db.com/exploits/47379 (ExploitDB-47379) exploit

www.vulncheck.com/...-remote-code-execution-via-login-action (VulnCheck Advisory: Epross AVCON6 OGNL Remote Code Execution via login.action) third-party-advisory

cve.org (CVE-2018-25159)

nvd.nist.gov (CVE-2018-25159)

Download JSON