Metrics
Affected Vendors & Products
Mon, 23 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | JingDong JD Cloud Box AX6600 jdcapp_rpc controlDevice get_status privilege escalation | JingDong JD Cloud Box AX6600 jdcapp_rpc controlDevice get_status privileges management |
| Weaknesses | CWE-266 |
Thu, 19 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jdcloud
Jdcloud ax6600 Jdcloud ax6600 Firmware |
|
| Weaknesses | CWE-269 | |
| CPEs | cpe:2.3:h:jdcloud:ax6600:-:*:*:*:*:*:*:* cpe:2.3:o:jdcloud:ax6600_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Jdcloud
Jdcloud ax6600 Jdcloud ax6600 Firmware |
Tue, 17 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Feb 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jingdong
Jingdong jd Cloud Box Ax6600 |
|
| Vendors & Products |
Jingdong
Jingdong jd Cloud Box Ax6600 |
Mon, 16 Feb 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. Affected is the function set_stcreenen_deabled_status/get_status of the file /f/service/controlDevice of the component jdcapp_rpc. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | JingDong JD Cloud Box AX6600 jdcapp_rpc controlDevice get_status privilege escalation | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-02-16T15:32:45.758Z
Updated: 2026-02-23T10:12:19.399Z
Reserved: 2026-02-15T19:17:13.144Z
Link: CVE-2026-2563
Updated: 2026-02-17T14:56:51.375Z
Status : Modified
Published: 2026-02-16T16:19:18.070
Modified: 2026-02-23T11:16:32.330
Link: CVE-2026-2563
No data.