CVE-2026-2561: Privilege Escalation in JingDong JD Cloud Box AX6600
CVE-2026-2561 is a medium-severity remote privilege escalation vulnerability affecting JingDong JD Cloud Box AX6600 devices running firmware up to version 4. 5. 1. r4533. The flaw exists in the web_get_ddns_uptime function within the jdcweb_rpc component, allowing an unauthenticated attacker to escalate privileges remotely without user interaction. Although the vendor has not responded to the disclosure and no official patch is available, public exploit code exists, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the partial scope and requirement of some existing privileges. European organizations using this device, especially in countries with higher adoption of JingDong networking hardware, could face targeted attacks. Mitigation requires network segmentation, disabling remote management if unused, and monitoring for suspicious activity. Given the lack of vendor response and public exploits, proactive defensive measures are critical to reduce exposure.
AI Analysis
Technical Summary
CVE-2026-2561 is a remote privilege escalation vulnerability identified in the JingDong JD Cloud Box AX6600, specifically affecting firmware versions up to 4.5.1.r4533. The vulnerability resides in the web_get_ddns_uptime function of the /jdcapi file within the jdcweb_rpc component. An attacker can exploit this flaw remotely without authentication or user interaction by manipulating the vulnerable function, resulting in escalation of privileges on the device. This could allow the attacker to gain higher-level access than intended, potentially enabling unauthorized configuration changes, data access, or disruption of device operation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity with network attack vector, low attack complexity, no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. The vendor JingDong was contacted early but has not issued a patch or response, and public exploit code is available, increasing the risk of exploitation. No known exploits in the wild have been confirmed yet. The vulnerability affects a specific consumer and enterprise networking product, which may be deployed in various environments including European organizations relying on JingDong hardware for cloud or network services.
Potential Impact
For European organizations, exploitation of CVE-2026-2561 could lead to unauthorized privilege escalation on affected JD Cloud Box AX6600 devices, potentially compromising network security. This could allow attackers to alter device configurations, intercept or manipulate data, or disrupt network services, impacting confidentiality, integrity, and availability. Organizations using these devices as part of their network infrastructure or cloud edge deployments may face increased risk of lateral movement or persistent access by attackers. The lack of vendor patching and public exploit availability heightens the threat landscape. While the impact is medium severity, targeted attacks against critical infrastructure or sensitive environments could amplify consequences. The vulnerability is particularly concerning for sectors relying on secure network management, such as finance, telecommunications, and government agencies within Europe.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement specific mitigations: 1) Immediately disable remote management interfaces on JD Cloud Box AX6600 devices if not strictly necessary to reduce attack surface. 2) Employ network segmentation to isolate these devices from critical infrastructure and sensitive data networks. 3) Monitor network traffic and device logs for unusual activity related to the /jdcapi endpoint or unexpected privilege escalations. 4) Restrict access to the affected devices to trusted IP addresses and enforce strict firewall rules. 5) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. 6) Plan for device replacement or firmware upgrade once a vendor patch becomes available, and maintain close communication with JingDong for updates. 7) Conduct regular security audits and vulnerability assessments on network devices to identify and remediate similar risks proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2026-2561: Privilege Escalation in JingDong JD Cloud Box AX6600
Description
CVE-2026-2561 is a medium-severity remote privilege escalation vulnerability affecting JingDong JD Cloud Box AX6600 devices running firmware up to version 4. 5. 1. r4533. The flaw exists in the web_get_ddns_uptime function within the jdcweb_rpc component, allowing an unauthenticated attacker to escalate privileges remotely without user interaction. Although the vendor has not responded to the disclosure and no official patch is available, public exploit code exists, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the partial scope and requirement of some existing privileges. European organizations using this device, especially in countries with higher adoption of JingDong networking hardware, could face targeted attacks. Mitigation requires network segmentation, disabling remote management if unused, and monitoring for suspicious activity. Given the lack of vendor response and public exploits, proactive defensive measures are critical to reduce exposure.
AI-Powered Analysis
Technical Analysis
CVE-2026-2561 is a remote privilege escalation vulnerability identified in the JingDong JD Cloud Box AX6600, specifically affecting firmware versions up to 4.5.1.r4533. The vulnerability resides in the web_get_ddns_uptime function of the /jdcapi file within the jdcweb_rpc component. An attacker can exploit this flaw remotely without authentication or user interaction by manipulating the vulnerable function, resulting in escalation of privileges on the device. This could allow the attacker to gain higher-level access than intended, potentially enabling unauthorized configuration changes, data access, or disruption of device operation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity with network attack vector, low attack complexity, no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. The vendor JingDong was contacted early but has not issued a patch or response, and public exploit code is available, increasing the risk of exploitation. No known exploits in the wild have been confirmed yet. The vulnerability affects a specific consumer and enterprise networking product, which may be deployed in various environments including European organizations relying on JingDong hardware for cloud or network services.
Potential Impact
For European organizations, exploitation of CVE-2026-2561 could lead to unauthorized privilege escalation on affected JD Cloud Box AX6600 devices, potentially compromising network security. This could allow attackers to alter device configurations, intercept or manipulate data, or disrupt network services, impacting confidentiality, integrity, and availability. Organizations using these devices as part of their network infrastructure or cloud edge deployments may face increased risk of lateral movement or persistent access by attackers. The lack of vendor patching and public exploit availability heightens the threat landscape. While the impact is medium severity, targeted attacks against critical infrastructure or sensitive environments could amplify consequences. The vulnerability is particularly concerning for sectors relying on secure network management, such as finance, telecommunications, and government agencies within Europe.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement specific mitigations: 1) Immediately disable remote management interfaces on JD Cloud Box AX6600 devices if not strictly necessary to reduce attack surface. 2) Employ network segmentation to isolate these devices from critical infrastructure and sensitive data networks. 3) Monitor network traffic and device logs for unusual activity related to the /jdcapi endpoint or unexpected privilege escalations. 4) Restrict access to the affected devices to trusted IP addresses and enforce strict firewall rules. 5) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. 6) Plan for device replacement or firmware upgrade once a vendor patch becomes available, and maintain close communication with JingDong for updates. 7) Conduct regular security audits and vulnerability assessments on network devices to identify and remediate similar risks proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-15T19:17:05.881Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699330d2d1735ca731922b87
Added to database: 2/16/2026, 2:59:30 PM
Last enriched: 2/16/2026, 3:13:49 PM
Last updated: 2/16/2026, 4:51:11 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1783
LowCVE-2026-2562: Privilege Escalation in JingDong JD Cloud Box AX6600
MediumDior, Louis Vuitton, Tiffany Fined $25 Million in South Korea After Data Breaches
MediumCVE-2026-2560: OS Command Injection in kalcaddle kodbox
MediumCVE-2026-2558: Server-Side Request Forgery in GeekAI
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.