CVE-2026-2563
Published: 16 February 2026
Description
A vulnerability was identified in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. Affected is the function set_stcreenen_deabled_status/get_status of the file /f/service/controlDevice of the component jdcapp_rpc. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack…
more
remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Mitigating Controls (NIST 800-53 r5)AI
Enforces least privilege to ensure users and processes have only necessary access rights, directly mitigating improper privilege management (CWE-269) and preventing escalation from low privileges.
Mandates enforcement of approved access control policies at the system level, addressing the failure in privilege checks within the vulnerable jdcapp_rpc functions.
Requires identification, reporting, and timely remediation of software flaws like this privilege escalation vulnerability, including patching or workarounds despite vendor non-response.
Security SummaryAI
CVE-2026-2563 is a remote privilege escalation vulnerability affecting JingDong JD Cloud Box AX6600 routers running versions up to 4.5.1.r4533. The issue resides in the set_stcreenen_deabled_status and get_status functions within the /f/service/controlDevice endpoint of the jdcapp_rpc component. Assigned a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), it maps to CWEs 266 (Incorrect Privilege Assignment) and 269 (Improper Privilege Management). The vulnerability was published on 2026-02-16.
An attacker with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity and no user interaction required. Successful exploitation enables remote privilege escalation, potentially granting elevated access on the device and resulting in low-level impacts to confidentiality, integrity, and availability.
Advisories from VulDB indicate that a public exploit is available and may be in use, but the vendor was notified early without any response or patch release. References including VulDB entries (ctiid.346170, id.346170) and a Feishu wiki provide further details, but no mitigations or vendor guidance are specified.
The public availability of the exploit heightens the risk for unpatched JD Cloud Box AX6600 deployments.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2026-2563 is a remote privilege escalation vulnerability due to incorrect privilege assignment and management (CWEs 266/269) in the jdcapp_rpc component, directly enabling exploitation for privilege escalation (T1068).