Home

Description

Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invoking exposed debug functionality. Attackers can craft POST requests with attacker-controlled interfaceName and methodName parameters to reach command-execution helpers and achieve arbitrary command execution on the system. Exploitation evidence was first observed by the Shadowserver Foundation on 2026-03-31 (UTC).

PUBLISHED Reserved 2026-01-08 | Published 2026-04-07 | Updated 2026-05-05 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unaffected

Any version before 20260312
affected

Credits

The Shadowserver Foundation reporter

References

blog.vega.io/.../cve-2026-22679-weaver-ecology-exploitation/ third-party-advisory

www.weaver.com.cn/cs/securityDownload.html release-notes

h4cker.zip/post/d5d211/ technical-description exploit

ti.qianxin.com/vulnerability/notice-detail/1760 third-party-advisory

www.vulncheck.com/...ticated-rce-via-dubboapi-debug-endpoint third-party-advisory

cve.org (CVE-2026-22679)

nvd.nist.gov (CVE-2026-22679)

Download JSON