Ax6600 firmware Vulnerabilities

Security vulnerability tracking for Jdcloud Ax6600 firmware

Last updated: Feb 16, 2026
Total CVEs

3

Critical

0

With Exploits

3

Last 30 Days

0

Vulnerability Timeline

3 vulnerabilities discovered over time for Ax6600 firmware

Severity Distribution

Critical0
0%
High0
0%
Medium3
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2026-25635.3

An attacker can remotely gain higher privileges on the JingDong JD Cloud Box AX6600, potentially allowing them to take control of the device. This vulnerability affects specific firmware versions and can be exploited without needing physical access to the device.

jdcloudax6600 firmware
Exploit Available
about 2 months agoFeb 16, 2026
CVE-2026-25625.3

This vulnerability allows an attacker to gain higher-level access to the JingDong JD Cloud Box AX6600 from a remote location, potentially letting them control the device. The issue arises from a flaw in how the device handles certain input, and it affects specific firmware versions up to 4.5.1.r4533.

jdcloudax6600 firmware
Exploit Available
about 2 months agoFeb 16, 2026
CVE-2026-25615.3

An attacker can remotely gain higher privileges on the JingDong JD Cloud Box AX6600, potentially allowing them to take control of the device. This vulnerability affects specific firmware versions and can be exploited without needing physical access to the device.

jdcloudax6600 firmware
Exploit Available
about 2 months agoFeb 16, 2026

About Jdcloud Ax6600 firmware Security

This page provides comprehensive security vulnerability tracking for Jdcloud Ax6600 firmware. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Ax6600 firmware updated to the latest version
  • • Subscribe to security advisories from Jdcloud
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately