3
0
3
0
Vulnerability Timeline
3 vulnerabilities discovered over time for Ax6600 firmware
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-2563 | 5.3 | An attacker can remotely gain higher privileges on the JingDong JD Cloud Box AX6600, potentially allowing them to take control of the device. This vulnerability affects specific firmware versions and can be exploited without needing physical access to the device. | jdcloudax6600 firmware | Exploit Available | about 2 months agoFeb 16, 2026 |
| CVE-2026-2562 | 5.3 | This vulnerability allows an attacker to gain higher-level access to the JingDong JD Cloud Box AX6600 from a remote location, potentially letting them control the device. The issue arises from a flaw in how the device handles certain input, and it affects specific firmware versions up to 4.5.1.r4533. | jdcloudax6600 firmware | Exploit Available | about 2 months agoFeb 16, 2026 |
| CVE-2026-2561 | 5.3 | An attacker can remotely gain higher privileges on the JingDong JD Cloud Box AX6600, potentially allowing them to take control of the device. This vulnerability affects specific firmware versions and can be exploited without needing physical access to the device. | jdcloudax6600 firmware | Exploit Available | about 2 months agoFeb 16, 2026 |
About Jdcloud Ax6600 firmware Security
This page provides comprehensive security vulnerability tracking for Jdcloud Ax6600 firmware. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Ax6600 firmware updated to the latest version
- • Subscribe to security advisories from Jdcloud
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately