Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

The Hacker News by The Hacker News
May 5, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Ravie LakshmananMay 05, 2026Vulnerability / Network Security

A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild.

The vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthenticated remote code execution affecting Weaver E-cology 10.0 versions prior to 20260312. The issue resides in the “/papi/esearch/data/devops/dubboApi/debug/method” endpoint that allows an attacker to execute arbitrary commands by invoking exposed debug functionality.

“Attackers can craft POST requests with attacker-controlled interfaceName and methodName parameters to reach command-execution helpers and achieve arbitrary command execution on the system,” according to a description of the flaw in the NIST National Vulnerability Database (NVD).

The advisory also noted that the Shadowserver Foundation observed the first signs of active exploitation on March 31, 2026. Chinese security vendor QiAnXin said it was able to successfully reproduce the remote code execution vulnerability in its own alert released on March 17, 2026.

However, in a report published last week, the Vega Research Team said it identified active exploitation of CVE-2026-22679, with the earliest evidence of abuse dating back to March 17, 2026, five days after patches were shipped for the flaw.

“The intrusion unfolded over roughly a week of operator activity: RCE verification, three failed payload drops, an attempted pivot to an MSI implant that did not produce a working install, and a short burst of attempts to retrieve PowerShell payloads from attacker-controlled infrastructure,” security researcher Daniel Messing said.

The MSI installer, per the Israeli cybersecurity company, used the name “fanwei0324.msi,” indicating an attempt to pass off the malicious payload as harmless by using the romanized Chinese name for Weaver. The unknown threat actor has also been observed running discovery commands, such as whoami, ipconfig, and tasklist, throughout the campaign.

Security researcher Kerem Oruc has made available a Python-based detection script that identifies vulnerable Weaver E-cology instances by checking if the susceptible API endpoint is accessible. Users are advised to apply the updates, if not already, to stay protected.



Source link

The Hacker News

The Hacker News

Next Post
ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

Recommended.

Trump’s Crackdown on Foreign Student Visas Could Derail Critical AI Research

Trump’s Crackdown on Foreign Student Visas Could Derail Critical AI Research

May 29, 2025
Dahua Technology erhält die Zertifizierung des Managementsystems für die Einhaltung der ISO 37301

Dahua Technology erhält die Zertifizierung des Managementsystems für die Einhaltung der ISO 37301

December 30, 2024

Trending.

Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

May 1, 2026
Global AI Innovators Welcomed as WAIC Opens Applications for 2026 SAIL Award With 0,000+ Prize Pool

Global AI Innovators Welcomed as WAIC Opens Applications for 2026 SAIL Award With $280,000+ Prize Pool

April 2, 2026
Intel Gives Bullish CPU Outlook With .2B Ireland Fab Deal

Intel Gives Bullish CPU Outlook With $14.2B Ireland Fab Deal

April 1, 2026
Armada to Deliver Sovereign AI at the Edge with Microsoft Azure Local

Armada to Deliver Sovereign AI at the Edge with Microsoft Azure Local

April 1, 2026
EPG Adds Over US0 Million in Series B+ Financing, Expanding Strategic Backing for Global AI Data Center Growth

EPG Adds Over US$100 Million in Series B+ Financing, Expanding Strategic Backing for Global AI Data Center Growth

March 31, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio