Description
ERP developed by eAI Technologies has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a crafted DLL file in the same directory as the program, thereby executing arbitrary code.
Published: 2026-02-23
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Authorized Code Execution
Action: Immediate Patch
AI Analysis

Impact

An authenticated local user can place a malicious DLL in the directory where the eAI Technologies ERP F2 application resides, causing the program to load the crafted library and execute arbitrary code. The vulnerability is a classic DLL hijacking flaw, allowing the attacker to gain the same privileges as the running process.

Affected Systems

The flaw has been identified in eAI Technologies' ERP F2 product. The vendor’s fix is released in ERP F10 (the PowerBuilder 2025 version). No other products or versions are currently listed as affected.

Risk and Exploitability

The CVSS score of 8.5 classifies the vulnerability as High severity, reflecting the significant impact of arbitrary code execution on confidentiality, integrity, and availability. The EPSS score indicates a very low probability of exploitation (<1%), and the vulnerability is not listed in the CISA KEV catalogue. The attack vector is inferred to be local authenticated access, as the description specifies that an authenticated, local attacker can place a crafted DLL in the program directory.

Generated by OpenCVE AI on April 17, 2026 at 16:23 UTC.

Remediation

Vendor Solution

Please upgrade to ERP F10(PowerBuilder 2025 version).


OpenCVE Recommended Actions

  • Upgrade the ERP application to version ERP F10 (PowerBuilder 2025) as specified by the vendor.
  • Configure the application directory so that only privileged users have write permission, preventing ordinary users from dropping DLL files there.
  • Enable operating‑system features such as code signing enforcement or runtime DLL path validation to ensure that only trusted libraries are loaded by the application.

Generated by OpenCVE AI on April 17, 2026 at 16:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Eai Technologies
Eai Technologies erp F2
Vendors & Products Eai Technologies
Eai Technologies erp F2

Mon, 23 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 03:30:00 +0000

Type Values Removed Values Added
Description ERP developed by eAI Technologies has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a crafted DLL file in the same directory as the program, thereby executing arbitrary code.
Title eAI Technologies|ERP - DLL Hijacking
Weaknesses CWE-426
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Eai Technologies Erp F2
cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2026-02-23T13:31:55.139Z

Reserved: 2026-02-23T01:38:28.970Z

Link: CVE-2026-2998

cve-icon Vulnrichment

Updated: 2026-02-23T13:31:48.976Z

cve-icon NVD

Status : Deferred

Published: 2026-02-23T04:16:02.537

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2998

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:30:05Z

Weaknesses