Description
Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges.
Published: 2026-03-11
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an OGNL injection flaw in the login.action endpoint of the Epross AVCON6 systems management platform, allowing unauthenticated attackers to execute arbitrary system commands with root privileges. This is a classic Remote Code Execution (RCE) weakness, categorized as CWE-1334. The impact is full compromise of confidentiality, integrity, and availability of the affected system.

Affected Systems

Affected product: Epross AVCON6 Systems Management Platform. No specific version information is supplied in the CVE record, so all installations of this platform are presumed vulnerable.

Risk and Exploitability

The CVSS score of 9.3 classifies this vulnerability as Critical. The EPSS score of <1% indicates a low current exploitation probability; however, the vulnerability remains exploitable via unauthenticated HTTP requests to the login.action endpoint. It is not listed in the CISA KEV catalog. Attackers can craft payloads in the redirect parameter to instantiate ProcessBuilder objects and run system commands.

Generated by OpenCVE AI on March 17, 2026 at 14:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor patch or update to a version that fixes the OGNL injection flaw (if available).
  • If a patch is not available, block or restrict access to the /login.action endpoint using a firewall or reverse proxy configuration.
  • As a temporary workaround, remove or disable the redirect parameter handling in login.action if possible.

Generated by OpenCVE AI on March 17, 2026 at 14:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Epross
Epross avcon6 Systems Management Platform
Vendors & Products Epross
Epross avcon6 Systems Management Platform

Wed, 11 Mar 2026 22:30:00 +0000


Wed, 11 Mar 2026 22:00:00 +0000


Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges.
Title Epross AVCON6 OGNL Remote Code Execution via login.action
Weaknesses CWE-1334
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Epross Avcon6 Systems Management Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:03:50.611Z

Reserved: 2026-02-22T14:41:38.776Z

Link: CVE-2018-25159

cve-icon Vulnrichment

Updated: 2026-03-11T19:23:14.183Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T19:15:59.020

Modified: 2026-03-12T21:08:22.643

Link: CVE-2018-25159

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:29:56Z

Weaknesses