CVE-2026-2563
Plain English Summary
AI-powered analysis for quick understanding
An attacker can remotely gain higher privileges on the JingDong JD Cloud Box AX6600, potentially allowing them to take control of the device. This vulnerability affects specific firmware versions and can be exploited without needing physical access to the device.
Technical Description
A vulnerability was identified in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. Affected is the function set_stcreenen_deabled_status/get_status of the file /f/service/controlDevice of the component jdcapp_rpc. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 16, 2026
about 2 months ago
Last Modified
Feb 19, 2026
about 2 months ago
Vendor
jdcloud
Product
ax6600 firmware
Related Vulnerabilities
This vulnerability allows an attacker to gain higher-level access to the JingDong JD Cloud Box AX6600 from a remote location, potentially letting them control the device. The issue arises from a flaw in how the device handles certain input, and it affects specific firmware versions up to 4.5.1.r4533.
An attacker can remotely gain higher privileges on the JingDong JD Cloud Box AX6600, potentially allowing them to take control of the device. This vulnerability affects specific firmware versions and can be exploited without needing physical access to the device.