Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invoking exposed debug functionality. Attackers can craft POST requests with attacker-controlled interfaceName and methodName parameters to reach command-execution helpers and achieve arbitrary command execution on the system. Exploitation evidence was first observed by the Shadowserver Foundation on 2026-03-31 (UTC).
References
| Link | Resource |
|---|---|
| https://h4cker.zip/post/d5d211/ | Broken Link |
| https://ti.qianxin.com/vulnerability/notice-detail/1760 | Third Party Advisory |
| https://www.vulncheck.com/advisories/weaver-e-cology-unauthenticated-rce-via-dubboapi-debug-endpoint | Third Party Advisory |
| https://www.weaver.com.cn/cs/securityDownload.html# | Patch |
Configurations
History
24 Apr 2026, 15:31
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Weaver
Weaver e-cology |
|
| CPE | cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:* | |
| References | () https://h4cker.zip/post/d5d211/ - Broken Link | |
| References | () https://ti.qianxin.com/vulnerability/notice-detail/1760 - Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/weaver-e-cology-unauthenticated-rce-via-dubboapi-debug-endpoint - Third Party Advisory | |
| References | () https://www.weaver.com.cn/cs/securityDownload.html# - Patch |
07 Apr 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-07 13:16
Updated : 2026-04-24 15:31
NVD link : CVE-2026-22679
Mitre link : CVE-2026-22679
CVE.ORG link : CVE-2026-22679
JSON object : View
Products Affected
weaver
- e-cology
CWE
CWE-306
Missing Authentication for Critical Function
