CVE-2026-2562: Privilege Escalation in JingDong JD Cloud Box AX6600
CVE-2026-2562 is a medium-severity remote privilege escalation vulnerability affecting JingDong JD Cloud Box AX6600 devices running firmware up to version 4. 5. 1. r4533. The flaw exists in the cast_streen function within the /jdcapi file of the jdcweb_rpc component, where manipulation of the File argument can lead to unauthorized privilege escalation without requiring authentication or user interaction. Although the vendor has not responded to disclosure attempts and no patches are currently available, the exploit code has been publicly disclosed, increasing the risk of exploitation. This vulnerability allows attackers to remotely gain elevated privileges, potentially compromising device integrity and confidentiality. European organizations using these devices in cloud or network infrastructure could face increased risk, especially in countries with higher adoption of JingDong products. Mitigation currently relies on network-level protections, strict access controls, and monitoring for suspicious activity until a vendor patch is released. Given the CVSS 4.
AI Analysis
Technical Summary
CVE-2026-2562 is a vulnerability identified in the JingDong JD Cloud Box AX6600, specifically affecting firmware versions up to 4.5.1.r4533. The vulnerability resides in the cast_streen function of the /jdcapi file within the jdcweb_rpc component. An attacker can manipulate the File argument passed to this function to trigger a remote privilege escalation, allowing them to gain higher-level access on the device without prior authentication or user interaction. The vulnerability is exploitable remotely over the network, which significantly increases the attack surface. The vendor was notified early but has not issued any response or patch, and the exploit code has been publicly disclosed, raising the risk of active exploitation. The CVSS 4.0 vector indicates low attack complexity, no privileges required, no user interaction, and partial impact on confidentiality, integrity, and availability. This vulnerability could allow attackers to execute unauthorized commands or modify system configurations, potentially leading to broader network compromise if the device is part of critical infrastructure or cloud services. The lack of vendor response and patch availability means organizations must rely on compensating controls to mitigate risk. The JD Cloud Box AX6600 is typically used in cloud storage and network environments, making this vulnerability relevant for organizations leveraging these devices for data storage or cloud services.
Potential Impact
For European organizations, exploitation of CVE-2026-2562 could lead to unauthorized privilege escalation on JD Cloud Box AX6600 devices, compromising the confidentiality, integrity, and availability of data and services hosted on or managed by these devices. This could result in unauthorized access to sensitive information, disruption of cloud storage services, or use of the compromised device as a pivot point for further network attacks. Organizations relying on these devices for critical cloud infrastructure or data storage may experience operational disruptions or data breaches. The remote exploitability without authentication increases the risk of widespread attacks, especially in environments with exposed network interfaces. The absence of vendor patches heightens the urgency for European entities to implement alternative mitigations. The impact is particularly significant for sectors with stringent data protection requirements, such as finance, healthcare, and government, where unauthorized privilege escalation could lead to regulatory non-compliance and reputational damage.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement strict network segmentation to isolate JD Cloud Box AX6600 devices from untrusted networks and limit access to management interfaces. Employ firewall rules to restrict inbound traffic to only trusted IP addresses and monitor network traffic for anomalous activity targeting the /jdcapi endpoint. Deploy intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics tuned to detect exploitation attempts against this vulnerability. Regularly audit device configurations and logs for signs of unauthorized access or privilege escalation attempts. Where possible, disable or restrict the vulnerable jdcweb_rpc service or the cast_streen function if configurable. Maintain up-to-date backups of critical data stored on these devices to enable recovery in case of compromise. Engage with JingDong for updates or patches and plan for device replacement if a timely fix is not forthcoming. Additionally, educate IT staff about this vulnerability and the importance of monitoring and restricting access to affected devices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2026-2562: Privilege Escalation in JingDong JD Cloud Box AX6600
Description
CVE-2026-2562 is a medium-severity remote privilege escalation vulnerability affecting JingDong JD Cloud Box AX6600 devices running firmware up to version 4. 5. 1. r4533. The flaw exists in the cast_streen function within the /jdcapi file of the jdcweb_rpc component, where manipulation of the File argument can lead to unauthorized privilege escalation without requiring authentication or user interaction. Although the vendor has not responded to disclosure attempts and no patches are currently available, the exploit code has been publicly disclosed, increasing the risk of exploitation. This vulnerability allows attackers to remotely gain elevated privileges, potentially compromising device integrity and confidentiality. European organizations using these devices in cloud or network infrastructure could face increased risk, especially in countries with higher adoption of JingDong products. Mitigation currently relies on network-level protections, strict access controls, and monitoring for suspicious activity until a vendor patch is released. Given the CVSS 4.
AI-Powered Analysis
Technical Analysis
CVE-2026-2562 is a vulnerability identified in the JingDong JD Cloud Box AX6600, specifically affecting firmware versions up to 4.5.1.r4533. The vulnerability resides in the cast_streen function of the /jdcapi file within the jdcweb_rpc component. An attacker can manipulate the File argument passed to this function to trigger a remote privilege escalation, allowing them to gain higher-level access on the device without prior authentication or user interaction. The vulnerability is exploitable remotely over the network, which significantly increases the attack surface. The vendor was notified early but has not issued any response or patch, and the exploit code has been publicly disclosed, raising the risk of active exploitation. The CVSS 4.0 vector indicates low attack complexity, no privileges required, no user interaction, and partial impact on confidentiality, integrity, and availability. This vulnerability could allow attackers to execute unauthorized commands or modify system configurations, potentially leading to broader network compromise if the device is part of critical infrastructure or cloud services. The lack of vendor response and patch availability means organizations must rely on compensating controls to mitigate risk. The JD Cloud Box AX6600 is typically used in cloud storage and network environments, making this vulnerability relevant for organizations leveraging these devices for data storage or cloud services.
Potential Impact
For European organizations, exploitation of CVE-2026-2562 could lead to unauthorized privilege escalation on JD Cloud Box AX6600 devices, compromising the confidentiality, integrity, and availability of data and services hosted on or managed by these devices. This could result in unauthorized access to sensitive information, disruption of cloud storage services, or use of the compromised device as a pivot point for further network attacks. Organizations relying on these devices for critical cloud infrastructure or data storage may experience operational disruptions or data breaches. The remote exploitability without authentication increases the risk of widespread attacks, especially in environments with exposed network interfaces. The absence of vendor patches heightens the urgency for European entities to implement alternative mitigations. The impact is particularly significant for sectors with stringent data protection requirements, such as finance, healthcare, and government, where unauthorized privilege escalation could lead to regulatory non-compliance and reputational damage.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement strict network segmentation to isolate JD Cloud Box AX6600 devices from untrusted networks and limit access to management interfaces. Employ firewall rules to restrict inbound traffic to only trusted IP addresses and monitor network traffic for anomalous activity targeting the /jdcapi endpoint. Deploy intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics tuned to detect exploitation attempts against this vulnerability. Regularly audit device configurations and logs for signs of unauthorized access or privilege escalation attempts. Where possible, disable or restrict the vulnerable jdcweb_rpc service or the cast_streen function if configurable. Maintain up-to-date backups of critical data stored on these devices to enable recovery in case of compromise. Engage with JingDong for updates or patches and plan for device replacement if a timely fix is not forthcoming. Additionally, educate IT staff about this vulnerability and the importance of monitoring and restricting access to affected devices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-15T19:17:10.095Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69933465d1735ca73193848d
Added to database: 2/16/2026, 3:14:45 PM
Last enriched: 2/16/2026, 3:28:54 PM
Last updated: 2/16/2026, 5:53:43 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2567: Stack-based Buffer Overflow in Wavlink WL-NU516U1
HighCVE-2026-2566: Stack-based Buffer Overflow in Wavlink WL-NU516U1
HighCVE-2026-1783
LowDior, Louis Vuitton, Tiffany Fined $25 Million in South Korea After Data Breaches
MediumCVE-2026-2561: Privilege Escalation in JingDong JD Cloud Box AX6600
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.