CVE-2018-25159 PUBLISHED

Epross AVCON6 OGNL Remote Code Execution via login.action

Assigner: VulnCheck
Reserved: 22.02.2026 Published: 11.03.2026 Updated: 11.03.2026

Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor Epross
Product AVCON6 systems management platform
Versions Default: unaffected
  • Version * is affected

Credits

  • Nassim Asrir finder

References

Problem Types

  • CWE-1334 Unauthorized Error Injection Can Degrade Hardware Redundancy CWE