Soumettre #750986: JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Executioninformation

TitreJingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution
DescriptionRCE exists in the cast_streen interface of JD Wireless Treasure router The device received parameters from the user without strict processing and filtering, and directly concatenated them for command execution, resulting in RCE You can find a reproduction video of the vulnerability at the following link https://my.feishu.cn/wiki/Umb6w4PasizunKkagYschZP1nff
La source⚠️ https://my.feishu.cn/wiki/Umb6w4PasizunKkagYschZP1nff
Utilisateur
 ShiyuFan_BinYuan (UID 95126)
Soumission03/02/2026 09:55 (il y a 3 mois)
Modérer15/02/2026 20:17 (12 days later)
StatutAccepté
Entrée VulDB346169 [JingDong JD Cloud Box AX6600 jusqu’à 4.5.1.r4533 jdcweb_rpc /jdcapi cast_streen Fichier élévation de privilèges]
Points19

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!