Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2621: SQL Injection in Sciyon Koyuan Thermoelectricity Heat Network Management System

0
Medium
VulnerabilityCVE-2026-2621cvecve-2026-2621
Published: Tue Feb 17 2026 (02/17/2026, 20:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Sciyon
Product: Koyuan Thermoelectricity Heat Network Management System

Description

A security vulnerability has been detected in Sciyon Koyuan Thermoelectricity Heat Network Management System 3.0. This affects an unknown part of the file /SISReport/WebReport20/Proxy/AsyncTreeProxy.aspx. The manipulation of the argument PGUID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:44:20 UTC

Technical Analysis

CVE-2026-2621 identifies a SQL injection vulnerability in the Sciyon Koyuan Thermoelectricity Heat Network Management System version 3.0, specifically within the /SISReport/WebReport20/Proxy/AsyncTreeProxy.aspx file. The vulnerability arises from improper handling of the PGUID parameter, which can be manipulated by an unauthenticated remote attacker to inject malicious SQL queries. This flaw allows attackers to bypass security controls, potentially accessing or modifying sensitive database information related to the heat network management system. The vulnerability does not require user interaction or authentication, increasing its exploitability. The vendor was notified early but has not issued a patch or response, leaving systems exposed. The CVSS 4.0 base score is 6.9, reflecting medium severity due to the ease of remote exploitation and potential impact on confidentiality, integrity, and availability of the system. Although no exploits are currently known in the wild, public disclosure means attackers could develop exploits. The affected system is critical for managing thermoelectric heat networks, which are essential for energy distribution and infrastructure management. Exploitation could lead to unauthorized data disclosure, data tampering, or operational disruption, impacting service reliability and safety.

Potential Impact

The impact of CVE-2026-2621 is significant for organizations relying on the Sciyon Koyuan Thermoelectricity Heat Network Management System 3.0. Successful exploitation could lead to unauthorized access to sensitive operational data, manipulation of heat network configurations, or disruption of service availability. This could compromise the integrity and availability of critical energy infrastructure, potentially causing cascading effects on energy distribution and public safety. Confidentiality breaches could expose operational details to adversaries, facilitating further attacks or industrial espionage. The lack of authentication and remote exploitability increases the risk of widespread attacks, especially in environments where the system is accessible over networks without adequate segmentation. The absence of vendor patches prolongs exposure, increasing the window for attackers to develop and deploy exploits. Organizations may face operational downtime, regulatory penalties, and reputational damage if the vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2026-2621, organizations should implement the following specific measures: 1) Immediately restrict network access to the affected AsyncTreeProxy.aspx endpoint by applying firewall rules or network segmentation to limit exposure to trusted internal networks only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the PGUID parameter. 3) Conduct thorough input validation and sanitization on all parameters, especially PGUID, to prevent injection of malicious SQL code. 4) Monitor logs and network traffic for unusual queries or access patterns indicative of exploitation attempts. 5) If possible, deploy virtual patching techniques to intercept and neutralize malicious requests until an official patch is released. 6) Engage with the vendor for updates and consider alternative solutions if remediation is delayed. 7) Implement regular security assessments and penetration testing focused on this vulnerability. 8) Educate operational technology and IT teams about the risk and signs of exploitation to ensure rapid detection and response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-17T09:19:59.421Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699575b980d747be2053753f

Added to database: 2/18/2026, 8:18:01 AM

Last enriched: 2/28/2026, 1:44:20 PM

Last updated: 4/3/2026, 10:17:52 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses