| عنوان | JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution |
|---|
| الوصف | The web_get_ddns_uptime interface of the JD Wireless Treasure Router contains an RCE vulnerability
The device received parameters from the user without strict processing and filtering, and directly concatenated them for command execution, resulting in RCE
You can obtain vulnerability details by accessing the following link https://my.feishu.cn/wiki/URLywnBj2i2dpBk3dcQcWqFZnSK |
|---|
| المصدر | ⚠️ https://my.feishu.cn/wiki/URLywnBj2i2dpBk3dcQcWqFZnSK |
|---|
| المستخدم | ShiyuFan_BinYuan (UID 95126) |
|---|
| ارسال | 03/02/2026 09:20 AM (3 أشهر منذ) |
|---|
| الاعتدال | 15/02/2026 08:17 PM (12 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 346168 [JingDong JD Cloud Box AX6600 حتى 4.5.1.r4533 jdcweb_rpc /jdcapi web_get_ddns_uptime تجاوز الصلاحيات] |
|---|
| النقاط | 20 |
|---|