Description
A vulnerability was identified in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. Affected is the function set_stcreenen_deabled_status/get_status of the file /f/service/controlDevice of the component jdcapp_rpc. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Incorrect Privilege Assignment
Product status
Timeline
| 2026-02-15: | Advisory disclosed |
| 2026-02-15: | VulDB entry created |
| 2026-02-20: | VulDB entry last update |
Credits
ShiyuFan_BinYuan (VulDB User)
References
vuldb.com/?id.346170 (VDB-346170 | JingDong JD Cloud Box AX6600 jdcapp_rpc controlDevice get_status privileges management)
vuldb.com/?ctiid.346170 (VDB-346170 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.750987 (Submit #750987 | JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution)
vuldb.com/?submit.750992 (Submit #750992 | JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution (Duplicate))
my.feishu.cn/wiki/T3pjwxZtYiU4Gfkl6iUc3CzVnRe