CVE-2026-2563: Privilege Escalation in JingDong JD Cloud Box AX6600
A vulnerability was identified in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. Affected is the function set_stcreenen_deabled_status/get_status of the file /f/service/controlDevice of the component jdcapp_rpc. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-2563 is a remote privilege escalation vulnerability identified in the JingDong JD Cloud Box AX6600, specifically affecting firmware versions up to 4.5.1.r4533. The vulnerability resides in the functions set_stcreenen_deabled_status and get_status within the jdcapp_rpc component, located in the /f/service/controlDevice file. These functions can be manipulated remotely to escalate privileges without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:L/UI:N). The vulnerability impacts confidentiality, integrity, and availability at a low level but is exploitable remotely with low complexity. The vendor was contacted early but has not responded or released a patch, and a public exploit is available, increasing the risk of exploitation. The vulnerability affects the device's RPC mechanism, which is critical for device control and management, allowing attackers to gain unauthorized elevated access. This could lead to unauthorized configuration changes, data leakage, or denial of service. The CVSS 4.0 base score is 5.3, reflecting medium severity, primarily due to the requirement of some privileges (PR:L) but no authentication or user interaction. The lack of vendor response and public exploit availability heighten the urgency for mitigation. The affected product is a cloud-connected IoT device, likely deployed in enterprise and consumer environments, making it a potential target for attackers seeking footholds in networks or to disrupt services.
Potential Impact
For European organizations, the impact of CVE-2026-2563 can be significant, especially for those utilizing JingDong JD Cloud Box AX6600 devices in their infrastructure or IoT ecosystems. Successful exploitation allows attackers to escalate privileges remotely, potentially leading to unauthorized access to sensitive data, manipulation of device configurations, or disruption of services. This could compromise network integrity and availability, particularly if these devices serve as gateways or control points in broader network architectures. The vulnerability's remote exploitability without authentication increases the attack surface, enabling attackers to operate stealthily. Organizations in sectors relying on IoT for operational technology, smart office environments, or cloud-connected services may face increased risks of espionage, data breaches, or service outages. Additionally, the absence of a vendor patch and public exploit availability raises the likelihood of active exploitation attempts. The impact is compounded in environments where these devices are not isolated or monitored adequately, potentially allowing lateral movement within networks. Hence, European organizations must assess their exposure and implement compensating controls promptly to mitigate potential damage.
Mitigation Recommendations
Given the lack of an official patch from JingDong, European organizations should adopt a multi-layered mitigation strategy. First, isolate JD Cloud Box AX6600 devices on segmented network zones with strict firewall rules limiting inbound and outbound RPC traffic to trusted sources only. Implement network access controls to restrict management interfaces to authorized personnel and systems. Deploy intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous RPC calls or unusual privilege escalation attempts targeting the /f/service/controlDevice endpoint. Regularly audit device configurations and logs for signs of compromise or unauthorized changes. Where possible, disable or restrict the vulnerable functions if device firmware allows configuration changes. Engage in threat hunting activities focused on this vulnerability's indicators of compromise. Maintain up-to-date asset inventories to identify affected devices quickly. Consider deploying virtual patching via network security appliances to block exploit attempts until an official patch is released. Finally, establish communication channels with JingDong or third-party security communities to monitor for updates or patches and plan for timely firmware upgrades once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2026-2563: Privilege Escalation in JingDong JD Cloud Box AX6600
Description
A vulnerability was identified in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. Affected is the function set_stcreenen_deabled_status/get_status of the file /f/service/controlDevice of the component jdcapp_rpc. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2026-2563 is a remote privilege escalation vulnerability identified in the JingDong JD Cloud Box AX6600, specifically affecting firmware versions up to 4.5.1.r4533. The vulnerability resides in the functions set_stcreenen_deabled_status and get_status within the jdcapp_rpc component, located in the /f/service/controlDevice file. These functions can be manipulated remotely to escalate privileges without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:L/UI:N). The vulnerability impacts confidentiality, integrity, and availability at a low level but is exploitable remotely with low complexity. The vendor was contacted early but has not responded or released a patch, and a public exploit is available, increasing the risk of exploitation. The vulnerability affects the device's RPC mechanism, which is critical for device control and management, allowing attackers to gain unauthorized elevated access. This could lead to unauthorized configuration changes, data leakage, or denial of service. The CVSS 4.0 base score is 5.3, reflecting medium severity, primarily due to the requirement of some privileges (PR:L) but no authentication or user interaction. The lack of vendor response and public exploit availability heighten the urgency for mitigation. The affected product is a cloud-connected IoT device, likely deployed in enterprise and consumer environments, making it a potential target for attackers seeking footholds in networks or to disrupt services.
Potential Impact
For European organizations, the impact of CVE-2026-2563 can be significant, especially for those utilizing JingDong JD Cloud Box AX6600 devices in their infrastructure or IoT ecosystems. Successful exploitation allows attackers to escalate privileges remotely, potentially leading to unauthorized access to sensitive data, manipulation of device configurations, or disruption of services. This could compromise network integrity and availability, particularly if these devices serve as gateways or control points in broader network architectures. The vulnerability's remote exploitability without authentication increases the attack surface, enabling attackers to operate stealthily. Organizations in sectors relying on IoT for operational technology, smart office environments, or cloud-connected services may face increased risks of espionage, data breaches, or service outages. Additionally, the absence of a vendor patch and public exploit availability raises the likelihood of active exploitation attempts. The impact is compounded in environments where these devices are not isolated or monitored adequately, potentially allowing lateral movement within networks. Hence, European organizations must assess their exposure and implement compensating controls promptly to mitigate potential damage.
Mitigation Recommendations
Given the lack of an official patch from JingDong, European organizations should adopt a multi-layered mitigation strategy. First, isolate JD Cloud Box AX6600 devices on segmented network zones with strict firewall rules limiting inbound and outbound RPC traffic to trusted sources only. Implement network access controls to restrict management interfaces to authorized personnel and systems. Deploy intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous RPC calls or unusual privilege escalation attempts targeting the /f/service/controlDevice endpoint. Regularly audit device configurations and logs for signs of compromise or unauthorized changes. Where possible, disable or restrict the vulnerable functions if device firmware allows configuration changes. Engage in threat hunting activities focused on this vulnerability's indicators of compromise. Maintain up-to-date asset inventories to identify affected devices quickly. Consider deploying virtual patching via network security appliances to block exploit attempts until an official patch is released. Finally, establish communication channels with JingDong or third-party security communities to monitor for updates or patches and plan for timely firmware upgrades once available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-15T19:17:13.144Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6994257080d747be207b728e
Added to database: 2/17/2026, 8:23:12 AM
Last enriched: 2/17/2026, 8:24:52 AM
Last updated: 2/21/2026, 2:16:49 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.