CVE-2018-25159

Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges.
Configurations

No configuration.

History

15 Apr 2026, 14:56

Type Values Removed Values Added
Summary
  • (es) La plataforma de gestión de sistemas Epross AVCON6 contiene una vulnerabilidad de inyección de lenguaje de navegación de grafos de objetos (OGNL) que permite a atacantes no autenticados ejecutar comandos arbitrarios inyectando expresiones OGNL maliciosas. Los atacantes pueden enviar solicitudes manipuladas al endpoint login.action con cargas útiles OGNL en el parámetro redirect para instanciar objetos ProcessBuilder y ejecutar comandos del sistema con privilegios de root.

11 Mar 2026, 22:16

Type Values Removed Values Added
References
  • {'url': 'https://www.vulncheck.com/advisories/epross-avcon-ognl-remote-code-execution-via-loginaction', 'source': 'disclosure@vulncheck.com'}
  • () https://www.vulncheck.com/advisories/epross-avcon6-ognl-remote-code-execution-via-login-action -

11 Mar 2026, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-11 19:15

Updated : 2026-04-15 14:56


NVD link : CVE-2018-25159

Mitre link : CVE-2018-25159

CVE.ORG link : CVE-2018-25159


JSON object : View

Products Affected

No product.

CWE
CWE-1334

Unauthorized Error Injection Can Degrade Hardware Redundancy