Enviar #750987: JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Executioninformación

TítuloJingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution
DescripciónThere is an RCE vulnerability in the set_stcreenen_deabled_status interface of JD Wireless Treasure router. You can find a reproduced video of this vulnerability in the following link https://my.feishu.cn/wiki/T3pjwxZtYiU4Gfkl6iUc3CzVnRe The device received parameters from the user without strict processing and filtering, and directly concatenated them for command execution, resulting in RCE
Fuente⚠️ https://my.feishu.cn/wiki/T3pjwxZtYiU4Gfkl6iUc3CzVnRe
Usuario
 ShiyuFan_BinYuan (UID 95126)
Sumisión2026-02-03 10:01 (hace 3 meses)
Moderación2026-02-15 20:17 (12 days later)
EstadoAceptado
Entrada de VulDB346170 [JingDong JD Cloud Box AX6600 hasta 4.5.1.r4533 jdcapp_rpc /f/service/controlDevice set_stcreenen_deabled_status/get_status escalada de privilegios]
Puntos20

Want to know what is going to be exploited?

We predict KEV entries!