Home

Description

A vulnerability was identified in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. Affected is the function set_stcreenen_deabled_status/get_status of the file /f/service/controlDevice of the component jdcapp_rpc. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-02-15 | Published 2026-02-16 | Updated 2026-02-23 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Improper Privilege Management

Incorrect Privilege Assignment

Product status

4.5.1.r4533
affected

Timeline

2026-02-15:Advisory disclosed
2026-02-15:VulDB entry created
2026-02-20:VulDB entry last update

Credits

ShiyuFan_BinYuan (VulDB User) reporter

References

vuldb.com/?id.346170 (VDB-346170 | JingDong JD Cloud Box AX6600 jdcapp_rpc controlDevice get_status privileges management) vdb-entry technical-description

vuldb.com/?ctiid.346170 (VDB-346170 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.750987 (Submit #750987 | JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution) third-party-advisory

vuldb.com/?submit.750992 (Submit #750992 | JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution (Duplicate)) third-party-advisory

my.feishu.cn/wiki/T3pjwxZtYiU4Gfkl6iUc3CzVnRe exploit

cve.org (CVE-2026-2563)

nvd.nist.gov (CVE-2026-2563)

Download JSON