No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Feb 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jingdong
Jingdong jd Cloud Box Ax6600 |
|
| Vendors & Products |
Jingdong
Jingdong jd Cloud Box Ax6600 |
Mon, 16 Feb 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. Affected is the function set_stcreenen_deabled_status/get_status of the file /f/service/controlDevice of the component jdcapp_rpc. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | JingDong JD Cloud Box AX6600 jdcapp_rpc controlDevice get_status privilege escalation | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-17T14:56:54.644Z
Reserved: 2026-02-15T19:17:13.144Z
Link: CVE-2026-2563
Updated: 2026-02-17T14:56:51.375Z
Status : Received
Published: 2026-02-16T16:19:18.070
Modified: 2026-02-16T16:19:18.070
Link: CVE-2026-2563
No data.
OpenCVE Enrichment
Updated: 2026-02-17T08:49:31Z
No weakness.