Home

Description

A flaw has been found in JD Cloud JDCOS 4.5.1.r4518. This vulnerability affects the function set_iptv_info of the file /jdcap of the component Service Interface. Executing a manipulation of the argument vid can lead to command injection. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-05-03 | Published 2026-05-03 | Updated 2026-05-04 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Command Injection

Injection

Product status

4.5.1.r4518
affected

Timeline

2026-05-03:Advisory disclosed
2026-05-03:VulDB entry created
2026-05-03:VulDB entry last update

Credits

2er00ne (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/360881 (VDB-360881 | JD Cloud JDCOS Service jdcap set_iptv_info command injection) vdb-entry technical-description

vuldb.com/vuln/360881/cti (VDB-360881 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/805644 (Submit #805644 | jdcloud 京东云无线宝ER1 太乙 有线路由 千兆路由器 JDCOS-JDC08-4.5.1.r4518 Remote code execution) third-party-advisory

www.notion.so/3430c75766a8802dbde3dc8a372c7f46 exploit

cve.org (CVE-2026-7705)

nvd.nist.gov (CVE-2026-7705)

Download JSON