Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2562: Privilege Escalation in JingDong JD Cloud Box AX6600

0
Medium
VulnerabilityCVE-2026-2562cvecve-2026-2562
Published: Mon Feb 16 2026 (02/16/2026, 15:02:49 UTC)
Source: CVE Database V5
Vendor/Project: JingDong
Product: JD Cloud Box AX6600

Description

CVE-2026-2562 is a medium-severity remote privilege escalation vulnerability affecting JingDong JD Cloud Box AX6600 devices running firmware up to version 4. 5. 1. r4533. The flaw exists in the cast_streen function within the /jdcapi file of the jdcweb_rpc component, where manipulation of the File argument can lead to unauthorized privilege escalation without requiring authentication or user interaction. Although the vendor has not responded to disclosure attempts and no patches are currently available, the exploit code has been publicly disclosed, increasing the risk of exploitation. This vulnerability allows attackers to remotely gain elevated privileges, potentially compromising device integrity and confidentiality. European organizations using these devices in cloud or network infrastructure could face increased risk, especially in countries with higher adoption of JingDong products. Mitigation currently relies on network-level protections, strict access controls, and monitoring for suspicious activity until a vendor patch is released. Given the CVSS 4.

AI-Powered Analysis

AILast updated: 02/16/2026, 15:28:54 UTC

Technical Analysis

CVE-2026-2562 is a vulnerability identified in the JingDong JD Cloud Box AX6600, specifically affecting firmware versions up to 4.5.1.r4533. The vulnerability resides in the cast_streen function of the /jdcapi file within the jdcweb_rpc component. An attacker can manipulate the File argument passed to this function to trigger a remote privilege escalation, allowing them to gain higher-level access on the device without prior authentication or user interaction. The vulnerability is exploitable remotely over the network, which significantly increases the attack surface. The vendor was notified early but has not issued any response or patch, and the exploit code has been publicly disclosed, raising the risk of active exploitation. The CVSS 4.0 vector indicates low attack complexity, no privileges required, no user interaction, and partial impact on confidentiality, integrity, and availability. This vulnerability could allow attackers to execute unauthorized commands or modify system configurations, potentially leading to broader network compromise if the device is part of critical infrastructure or cloud services. The lack of vendor response and patch availability means organizations must rely on compensating controls to mitigate risk. The JD Cloud Box AX6600 is typically used in cloud storage and network environments, making this vulnerability relevant for organizations leveraging these devices for data storage or cloud services.

Potential Impact

For European organizations, exploitation of CVE-2026-2562 could lead to unauthorized privilege escalation on JD Cloud Box AX6600 devices, compromising the confidentiality, integrity, and availability of data and services hosted on or managed by these devices. This could result in unauthorized access to sensitive information, disruption of cloud storage services, or use of the compromised device as a pivot point for further network attacks. Organizations relying on these devices for critical cloud infrastructure or data storage may experience operational disruptions or data breaches. The remote exploitability without authentication increases the risk of widespread attacks, especially in environments with exposed network interfaces. The absence of vendor patches heightens the urgency for European entities to implement alternative mitigations. The impact is particularly significant for sectors with stringent data protection requirements, such as finance, healthcare, and government, where unauthorized privilege escalation could lead to regulatory non-compliance and reputational damage.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement strict network segmentation to isolate JD Cloud Box AX6600 devices from untrusted networks and limit access to management interfaces. Employ firewall rules to restrict inbound traffic to only trusted IP addresses and monitor network traffic for anomalous activity targeting the /jdcapi endpoint. Deploy intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics tuned to detect exploitation attempts against this vulnerability. Regularly audit device configurations and logs for signs of unauthorized access or privilege escalation attempts. Where possible, disable or restrict the vulnerable jdcweb_rpc service or the cast_streen function if configurable. Maintain up-to-date backups of critical data stored on these devices to enable recovery in case of compromise. Engage with JingDong for updates or patches and plan for device replacement if a timely fix is not forthcoming. Additionally, educate IT staff about this vulnerability and the importance of monitoring and restricting access to affected devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T19:17:10.095Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69933465d1735ca73193848d

Added to database: 2/16/2026, 3:14:45 PM

Last enriched: 2/16/2026, 3:28:54 PM

Last updated: 2/16/2026, 5:53:43 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats