A vulnerability was found in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. This affects the function web_get_ddns_uptime of the file /jdcapi of the component jdcweb_rpc. Performing a manipulation results in Remote Privilege Escalation. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://my.feishu.cn/wiki/URLywnBj2i2dpBk3dcQcWqFZnSK | Permissions Required Third Party Advisory |
| https://vuldb.com/?ctiid.346168 | Third Party Advisory VDB Entry |
| https://vuldb.com/?id.346168 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.750977 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
23 Feb 2026, 11:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-266 |
19 Feb 2026, 19:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Jdcloud ax6600
Jdcloud ax6600 Firmware Jdcloud |
|
| References | () https://my.feishu.cn/wiki/URLywnBj2i2dpBk3dcQcWqFZnSK - Permissions Required, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.346168 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?id.346168 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.750977 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:o:jdcloud:ax6600_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:jdcloud:ax6600:-:*:*:*:*:*:*:* |
18 Feb 2026, 17:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
17 Feb 2026, 18:20
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-269 |
16 Feb 2026, 15:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-16 15:18
Updated : 2026-02-23 11:16
NVD link : CVE-2026-2561
Mitre link : CVE-2026-2561
CVE.ORG link : CVE-2026-2561
JSON object : View
Products Affected
jdcloud
- ax6600
- ax6600_firmware
