A vulnerability was determined in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. This impacts the function cast_streen of the file /jdcapi of the component jdcweb_rpc. Executing a manipulation of the argument File can lead to Remote Privilege Escalation. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://my.feishu.cn/wiki/Umb6w4PasizunKkagYschZP1nff | Permissions Required Third Party Advisory |
| https://vuldb.com/?ctiid.346169 | Third Party Advisory VDB Entry |
| https://vuldb.com/?id.346169 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.750986 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
23 Feb 2026, 11:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-266 |
19 Feb 2026, 19:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Jdcloud ax6600
Jdcloud ax6600 Firmware Jdcloud |
|
| CPE | cpe:2.3:o:jdcloud:ax6600_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:jdcloud:ax6600:-:*:*:*:*:*:*:* |
|
| References | () https://my.feishu.cn/wiki/Umb6w4PasizunKkagYschZP1nff - Permissions Required, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.346169 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?id.346169 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.750986 - Third Party Advisory, VDB Entry |
18 Feb 2026, 17:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
17 Feb 2026, 18:20
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-269 |
16 Feb 2026, 15:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-16 15:18
Updated : 2026-02-23 11:16
NVD link : CVE-2026-2562
Mitre link : CVE-2026-2562
CVE.ORG link : CVE-2026-2562
JSON object : View
Products Affected
jdcloud
- ax6600
- ax6600_firmware
