CVE-2026-2998
Received Received - Intake
DLL Hijacking in eAI ERP Allows Local Code Execution

Publication date: 2026-02-23

Last updated on: 2026-02-23

Assigner: TWCERT/CC

Description
ERP developed by eAI Technologies has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a crafted DLL file in the same directory as the program, thereby executing arbitrary code.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-23
Last Modified
2026-02-23
Generated
2026-05-06
AI Q&A
2026-02-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
eai_technologies erp F2
eai_technologies erp From F10 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-426 The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-2998 is a DLL Hijacking vulnerability found in the ERP software developed by eAI Technologies. It allows an authenticated local attacker with low privileges to place a specially crafted DLL file in the same directory as the ERP program.

By doing so, the attacker can execute arbitrary code within the context of the ERP application without requiring user interaction.


How can this vulnerability impact me? :

This vulnerability can have a significant impact as it allows an attacker to execute arbitrary code on the affected system.

  • Confidentiality can be compromised (C:H) as sensitive data may be accessed or leaked.
  • Integrity can be affected (I:H) since the attacker can modify data or system behavior.
  • Availability can be disrupted (A:H) by causing denial of service or other interruptions.

The attack requires only local access with low privileges and no user interaction, making it easier for an attacker with some access to exploit.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

The recommended immediate step to mitigate this DLL Hijacking vulnerability in the ERP software developed by eAI Technologies is to upgrade the ERP software from version F2 to version F10.

ERP version F10 is based on PowerBuilder 2025 and addresses the vulnerability by preventing attackers from placing crafted DLL files in the same directory as the ERP executable.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart