Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges. | |
| Title | Epross AVCON6 OGNL Remote Code Execution via login.action | |
| Weaknesses | CWE-1334 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-11T19:31:04.055Z
Reserved: 2026-02-22T14:41:38.776Z
Link: CVE-2018-25159
Updated: 2026-03-11T19:23:14.183Z
Status : Received
Published: 2026-03-11T19:15:59.020
Modified: 2026-03-11T19:15:59.020
Link: CVE-2018-25159
No data.
OpenCVE Enrichment
No data.