Impact
The vulnerability exists in the set_stcreenen_deabled_status/get_status functions of the jdcapp_rpc component, which can be triggered via the /f/service/controlDevice endpoint. A crafted remote request allows an attacker to elevate their privileges on the JingDong JD Cloud Box AX6600, potentially enabling full administrative control. The issue is a classic privilege escalation flaw, reflected in CWE-266 and CWE-269 details, and an exploit is publicly available.
Affected Systems
JingDong JD Cloud Box AX6600, builds through firmware 4.5.1.r4533, including firmware revisions before the public fix. Only this model is impacted; no other JD Cloud Boxes or firmware revisions are listed.
Risk and Exploitability
With a CVSS score of 5.3, the flaw is a moderate risk when considering the likelihood of exploitation. The EPSS score is under 1%, indicating a low but non‑zero probability of real‑world attacks. The vulnerability is not currently in the CISA KEV catalog, and the attack vector is remote, exploiting the RPC interface. The publicly available exploit further raises the risk for any exposed device.
OpenCVE Enrichment