Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2561: Privilege Escalation in JingDong JD Cloud Box AX6600

0
Medium
VulnerabilityCVE-2026-2561cvecve-2026-2561
Published: Mon Feb 16 2026 (02/16/2026, 14:32:53 UTC)
Source: CVE Database V5
Vendor/Project: JingDong
Product: JD Cloud Box AX6600

Description

CVE-2026-2561 is a medium-severity remote privilege escalation vulnerability affecting JingDong JD Cloud Box AX6600 devices running firmware up to version 4. 5. 1. r4533. The flaw exists in the web_get_ddns_uptime function within the jdcweb_rpc component, allowing an unauthenticated attacker to escalate privileges remotely without user interaction. Although the vendor has not responded to the disclosure and no official patch is available, public exploit code exists, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the partial scope and requirement of some existing privileges. European organizations using this device, especially in countries with higher adoption of JingDong networking hardware, could face targeted attacks. Mitigation requires network segmentation, disabling remote management if unused, and monitoring for suspicious activity. Given the lack of vendor response and public exploits, proactive defensive measures are critical to reduce exposure.

AI-Powered Analysis

AILast updated: 02/16/2026, 15:13:49 UTC

Technical Analysis

CVE-2026-2561 is a remote privilege escalation vulnerability identified in the JingDong JD Cloud Box AX6600, specifically affecting firmware versions up to 4.5.1.r4533. The vulnerability resides in the web_get_ddns_uptime function of the /jdcapi file within the jdcweb_rpc component. An attacker can exploit this flaw remotely without authentication or user interaction by manipulating the vulnerable function, resulting in escalation of privileges on the device. This could allow the attacker to gain higher-level access than intended, potentially enabling unauthorized configuration changes, data access, or disruption of device operation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity with network attack vector, low attack complexity, no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. The vendor JingDong was contacted early but has not issued a patch or response, and public exploit code is available, increasing the risk of exploitation. No known exploits in the wild have been confirmed yet. The vulnerability affects a specific consumer and enterprise networking product, which may be deployed in various environments including European organizations relying on JingDong hardware for cloud or network services.

Potential Impact

For European organizations, exploitation of CVE-2026-2561 could lead to unauthorized privilege escalation on affected JD Cloud Box AX6600 devices, potentially compromising network security. This could allow attackers to alter device configurations, intercept or manipulate data, or disrupt network services, impacting confidentiality, integrity, and availability. Organizations using these devices as part of their network infrastructure or cloud edge deployments may face increased risk of lateral movement or persistent access by attackers. The lack of vendor patching and public exploit availability heightens the threat landscape. While the impact is medium severity, targeted attacks against critical infrastructure or sensitive environments could amplify consequences. The vulnerability is particularly concerning for sectors relying on secure network management, such as finance, telecommunications, and government agencies within Europe.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement specific mitigations: 1) Immediately disable remote management interfaces on JD Cloud Box AX6600 devices if not strictly necessary to reduce attack surface. 2) Employ network segmentation to isolate these devices from critical infrastructure and sensitive data networks. 3) Monitor network traffic and device logs for unusual activity related to the /jdcapi endpoint or unexpected privilege escalations. 4) Restrict access to the affected devices to trusted IP addresses and enforce strict firewall rules. 5) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. 6) Plan for device replacement or firmware upgrade once a vendor patch becomes available, and maintain close communication with JingDong for updates. 7) Conduct regular security audits and vulnerability assessments on network devices to identify and remediate similar risks proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T19:17:05.881Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699330d2d1735ca731922b87

Added to database: 2/16/2026, 2:59:30 PM

Last enriched: 2/16/2026, 3:13:49 PM

Last updated: 2/16/2026, 4:51:11 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats