<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>E-Cology — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/e-cology/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 13:16:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/e-cology/feed.xml" rel="self" type="application/rss+xml"/><item><title>Weaver E-cology Unauthenticated RCE via Dubbo API Debug Endpoint</title><link>https://feed.craftedsignal.io/briefs/2024-01-weaver-rce/</link><pubDate>Tue, 07 Apr 2026 13:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-weaver-rce/</guid><description>Weaver E-cology 10.0 before 20260312 is vulnerable to unauthenticated remote code execution, allowing attackers to execute arbitrary commands by crafting a POST request to the /papi/esearch/data/devops/dubboApi/debug/method endpoint.</description><content:encoded><![CDATA[<p>Weaver (Fanwei) E-cology is susceptible to an unauthenticated remote code execution (RCE) vulnerability affecting version 10.0 prior to 20260312. The vulnerability exists in the <code>/papi/esearch/data/devops/dubboApi/debug/method</code> endpoint, stemming from exposed debug functionality. Exploitation allows unauthenticated attackers to execute arbitrary commands on the underlying system. The attack involves crafting malicious POST requests with attacker-controlled <code>interfaceName</code> and <code>methodName</code> parameters. Shadowserver Foundation observed initial exploitation attempts on 2026-03-31 (UTC). Due to the ease of exploitation and lack of authentication requirement, this vulnerability presents a significant risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Weaver E-cology 10.0 instance running a version prior to 20260312.</li>
<li>Attacker crafts a malicious HTTP POST request targeting the <code>/papi/esearch/data/devops/dubboApi/debug/method</code> endpoint.</li>
<li>The POST request includes the <code>interfaceName</code> and <code>methodName</code> parameters, which are set to values designed to invoke command execution helpers.</li>
<li>The server processes the request without authentication due to the vulnerability.</li>
<li>The application invokes the specified <code>methodName</code> within the <code>interfaceName</code>, leading to the execution of attacker-controlled code.</li>
<li>The attacker-controlled code executes commands on the server, such as establishing a reverse shell.</li>
<li>The attacker gains remote access to the server.</li>
<li>The attacker pivots within the network, potentially leading to data exfiltration, system compromise, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary commands on the affected Weaver E-cology 10.0 server. This can lead to full system compromise, data exfiltration, and disruption of services. Given the critical nature of systems often managed by E-cology, this could have significant business impact, leading to financial losses, reputational damage, and legal liabilities. There is currently no public information on the number of victims or specific sectors targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all Weaver E-cology 10.0 installations to a version equal to or greater than 20260312 to patch CVE-2026-22679.</li>
<li>Deploy the Sigma rule &ldquo;Detect Weaver E-cology Dubbo API Exploitation Attempt&rdquo; to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for POST requests to the <code>/papi/esearch/data/devops/dubboApi/debug/method</code> endpoint with suspicious <code>interfaceName</code> and <code>methodName</code> parameters (see logsource details in the Sigma rule).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>weaver</category><category>e-cology</category><category>rce</category><category>unauthenticated</category><category>cve-2026-22679</category></item></channel></rss>