CVE-2026-2563

A vulnerability was identified in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. Affected is the function set_stcreenen_deabled_status/get_status of the file /f/service/controlDevice of the component jdcapp_rpc. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://my.feishu.cn/wiki/T3pjwxZtYiU4Gfkl6iUc3CzVnRe Permissions Required Third Party Advisory
https://vuldb.com/?ctiid.346170 Third Party Advisory VDB Entry
https://vuldb.com/?id.346170 Third Party Advisory VDB Entry
https://vuldb.com/?submit.750987 Third Party Advisory VDB Entry
https://vuldb.com/?submit.750992 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:jdcloud:ax6600_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:jdcloud:ax6600:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-16 16:19

Updated : 2026-02-23 11:16


NVD link : CVE-2026-2563

Mitre link : CVE-2026-2563

CVE.ORG link : CVE-2026-2563


JSON object : View

Products Affected

jdcloud

  • ax6600
  • ax6600_firmware
CWE
CWE-266

Incorrect Privilege Assignment

CWE-269

Improper Privilege Management