🔐 CVE Alert

CVE-2026-22679

CRITICAL 9.8

Weaver E-cology 10.0 Unauthenticated RCE via dubboApi Debug Endpoint

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invoking exposed debug functionality. Attackers can craft POST requests with attacker-controlled interfaceName and methodName parameters to reach command-execution helpers and achieve arbitrary command execution on the system. Exploitation evidence was first observed by the Shadowserver Foundation on 2026-03-31 (UTC).

CWE CWE-306
Vendor weaver network co., ltd.
Product e-cology
Published Apr 7, 2026
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for weaver network co., ltd. e-cology

Be the first to know when new critical vulnerabilities affecting weaver network co., ltd. e-cology are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Weaver Network Co., Ltd. / E-cology
0 < 20260312

References

NVD ↗ CVE.org ↗ EPSS Data ↗
weaver.com.cn: https://www.weaver.com.cn/cs/securityDownload.html# h4cker.zip: https://h4cker.zip/post/d5d211/ ti.qianxin.com: https://ti.qianxin.com/vulnerability/notice-detail/1760 vulncheck.com: https://www.vulncheck.com/advisories/weaver-e-cology-unauthenticated-rce-via-dubboapi-debug-endpoint

Credits

🔍 The Shadowserver Foundation