Weaver E-cology Unauthenticated RCE via Dubbo API Debug Endpoint
Weaver E-cology 10.0 before 20260312 is vulnerable to unauthenticated remote code execution, allowing attackers to execute arbitrary commands by crafting a POST request to the /papi/esearch/data/devops/dubboApi/debug/method endpoint.
Weaver (Fanwei) E-cology is susceptible to an unauthenticated remote code execution (RCE) vulnerability affecting version 10.0 prior to 20260312. The vulnerability exists in the /papi/esearch/data/devops/dubboApi/debug/method endpoint, stemming from exposed debug functionality. Exploitation allows unauthenticated attackers to execute arbitrary commands on the underlying system. The attack involves crafting malicious POST requests with attacker-controlled interfaceName and methodName parameters. Shadowserver Foundation observed initial exploitation attempts on 2026-03-31 (UTC). Due to the ease of exploitation and lack of authentication requirement, this vulnerability presents a significant risk.
Attack Chain
- Attacker identifies a vulnerable Weaver E-cology 10.0 instance running a version prior to 20260312.
- Attacker crafts a malicious HTTP POST request targeting the
/papi/esearch/data/devops/dubboApi/debug/methodendpoint. - The POST request includes the
interfaceNameandmethodNameparameters, which are set to values designed to invoke command execution helpers. - The server processes the request without authentication due to the vulnerability.
- The application invokes the specified
methodNamewithin theinterfaceName, leading to the execution of attacker-controlled code. - The attacker-controlled code executes commands on the server, such as establishing a reverse shell.
- The attacker gains remote access to the server.
- The attacker pivots within the network, potentially leading to data exfiltration, system compromise, or deployment of ransomware.
Impact
Successful exploitation of this vulnerability allows attackers to execute arbitrary commands on the affected Weaver E-cology 10.0 server. This can lead to full system compromise, data exfiltration, and disruption of services. Given the critical nature of systems often managed by E-cology, this could have significant business impact, leading to financial losses, reputational damage, and legal liabilities. There is currently no public information on the number of victims or specific sectors targeted.
Recommendation
- Upgrade all Weaver E-cology 10.0 installations to a version equal to or greater than 20260312 to patch CVE-2026-22679.
- Deploy the Sigma rule “Detect Weaver E-cology Dubbo API Exploitation Attempt” to detect exploitation attempts targeting the vulnerable endpoint.
- Monitor web server logs for POST requests to the
/papi/esearch/data/devops/dubboApi/debug/methodendpoint with suspiciousinterfaceNameandmethodNameparameters (see logsource details in the Sigma rule).
Detection coverage 3
Detect Weaver E-cology Dubbo API Exploitation Attempt
criticalDetects attempts to exploit the unauthenticated RCE vulnerability in Weaver E-cology's Dubbo API debug endpoint by monitoring POST requests with suspicious parameters.
Detect Suspicious Activity After Weaver E-cology RCE (Process Creation)
highDetects suspicious process creation following a potential RCE on a Weaver E-cology server.
Detect Suspicious File Creation After Weaver E-cology RCE
mediumDetects suspicious file creation following a potential RCE on a Weaver E-cology server, potentially indicating web shell deployment.
Detection queries are kept inside the platform. Get full rules →