EIC e-document system does not perform completed identity verification for sorting and filtering personnel data. The vulnerability allows remote attacker to obtain users?? credential information without logging in the system, and further acquire the privileged permissions and execute arbitrary commends.