Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Epross
Epross avcon6 Systems Management Platform |
|
| Vendors & Products |
Epross
Epross avcon6 Systems Management Platform |
Wed, 11 Mar 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 11 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 11 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges. | |
| Title | Epross AVCON6 OGNL Remote Code Execution via login.action | |
| Weaknesses | CWE-1334 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-03-11T18:23:07.407Z
Updated: 2026-03-11T21:46:16.000Z
Reserved: 2026-02-22T14:41:38.776Z
Link: CVE-2018-25159
Updated: 2026-03-11T19:23:14.183Z
Status : Received
Published: 2026-03-11T19:15:59.020
Modified: 2026-03-11T22:16:17.000
Link: CVE-2018-25159
No data.