<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>E-Cology 10.0 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/e-cology-10.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/e-cology-10.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Weaver E-cology Unauthenticated RCE Exploitation</title><link>https://feed.craftedsignal.io/briefs/2026-05-weaver-ecology-rce/</link><pubDate>Tue, 05 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-weaver-ecology-rce/</guid><description>A critical unauthenticated remote code execution vulnerability (CVE-2026-22679) in Weaver E-cology office automation software is being actively exploited to execute system commands and reconnaissance activities on affected servers.</description><content:encoded><![CDATA[<p>A critical unauthenticated remote code execution vulnerability, tracked as CVE-2026-22679, has been actively exploited in Weaver E-cology office automation software since mid-March 2026. The vulnerability impacts E-cology 10.0 builds prior to March 12, 2026, allowing attackers to execute arbitrary system commands without authentication. Threat actors were observed attempting to download and execute PowerShell-based payloads, as well as performing reconnaissance activities to gather information about the compromised systems. Weaver E-cology is primarily used by Chinese organizations. Defenders should prioritize patching vulnerable systems to prevent potential compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker exploits CVE-2026-22679, an unauthenticated RCE vulnerability in Weaver E-cology 10.0.</li>
<li>The attacker sends a crafted HTTP request to an exposed debug API endpoint.</li>
<li>The crafted request bypasses authentication and input validation, allowing the attacker to inject commands.</li>
<li>The injected commands are executed as system commands within the context of the Java process (java.exe) hosting Weaver&rsquo;s Tomcat server.</li>
<li>The attacker attempts to download and execute a target-aware MSI installer (fanwei0324.msi).</li>
<li>The attacker uses obfuscated and fileless PowerShell to repeatedly fetch remote scripts after initial attempts are blocked by endpoint defenses.</li>
<li>The attacker executes reconnaissance commands, such as <code>whoami</code>, <code>ipconfig</code>, and <code>tasklist</code>, to gather information about the compromised system.</li>
<li>The attacker aims to establish a persistent session on the targeted host but, according to the report, has not been successful.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22679 allows attackers to execute arbitrary system commands on vulnerable Weaver E-cology servers, potentially leading to complete system compromise. The attackers can perform reconnaissance, install malware, exfiltrate sensitive data, or disrupt business operations. Given the software&rsquo;s use in workflows, document management, HR, and internal business processes, a successful attack could have significant consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security updates provided by Weaver to address CVE-2026-22679 on all E-cology 10.0 installations prior to build 20260312.</li>
<li>Monitor process creation events where the parent process is <code>java.exe</code> (Weaver&rsquo;s Tomcat-bundled Java Virtual Machine) for suspicious command-line arguments using the &ldquo;Detect Weaver E-cology RCE via Java Process&rdquo; Sigma rule.</li>
<li>Monitor for the creation of processes executing reconnaissance commands (<code>whoami</code>, <code>ipconfig</code>, <code>tasklist</code>) after java.exe, using the &ldquo;Detect Reconnaissance Activity After Weaver E-cology RCE&rdquo; Sigma rule.</li>
<li>Inspect network connections initiated by the <code>java.exe</code> process, filtering for connections to uncommon or suspicious destinations.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>rce</category><category>weaver-ecology</category><category>cve-2026-22679</category><category>exploitation</category></item></channel></rss>