CVE-2018-25159

Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges.
Configurations

No configuration.

History

11 Mar 2026, 22:16

Type Values Removed Values Added
References
  • {'url': 'https://www.vulncheck.com/advisories/epross-avcon-ognl-remote-code-execution-via-loginaction', 'source': 'disclosure@vulncheck.com'}
  • () https://www.vulncheck.com/advisories/epross-avcon6-ognl-remote-code-execution-via-login-action -

11 Mar 2026, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-11 19:15

Updated : 2026-03-12 21:08


NVD link : CVE-2018-25159

Mitre link : CVE-2018-25159

CVE.ORG link : CVE-2018-25159


JSON object : View

Products Affected

No product.

CWE
CWE-1334

Unauthorized Error Injection Can Degrade Hardware Redundancy