Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jdcloud
Jdcloud ax6600 Jdcloud ax6600 Firmware |
|
| CPEs | cpe:2.3:h:jdcloud:ax6600:-:*:*:*:*:*:*:* cpe:2.3:o:jdcloud:ax6600_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Jdcloud
Jdcloud ax6600 Jdcloud ax6600 Firmware |
Tue, 17 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-269 | |
| Metrics |
ssvc
|
Tue, 17 Feb 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jingdong
Jingdong jd Cloud Box Ax6600 |
|
| Vendors & Products |
Jingdong
Jingdong jd Cloud Box Ax6600 |
Mon, 16 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. This impacts the function cast_streen of the file /jdcapi of the component jdcweb_rpc. Executing a manipulation of the argument File can lead to Remote Privilege Escalation. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | JingDong JD Cloud Box AX6600 jdcweb_rpc jdcapi cast_streen privilege escalation | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-17T17:21:03.189Z
Reserved: 2026-02-15T19:17:10.095Z
Link: CVE-2026-2562
Updated: 2026-02-17T17:20:51.842Z
Status : Analyzed
Published: 2026-02-16T15:18:35.020
Modified: 2026-02-19T19:36:44.447
Link: CVE-2026-2562
No data.
OpenCVE Enrichment
Updated: 2026-02-17T08:49:33Z