| Title | JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution |
|---|
| Description | There is an RCE vulnerability in the set_stcreenen_deabled_status interface of JD Wireless Treasure router.
You can find a reproduced video of this vulnerability in the following link https://my.feishu.cn/wiki/T3pjwxZtYiU4Gfkl6iUc3CzVnRe
The device received parameters from the user without strict processing and filtering, and directly concatenated them for command execution, resulting in RCE |
|---|
| Source | ⚠️ https://my.feishu.cn/wiki/T3pjwxZtYiU4Gfkl6iUc3CzVnRe |
|---|
| User | ShiyuFan_BinYuan (UID 95126) |
|---|
| Submission | 02/03/2026 10:01 (3 months ago) |
|---|
| Moderation | 02/15/2026 20:17 (12 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 346170 [JingDong JD Cloud Box AX6600 up to 4.5.1.r4533 jdcapp_rpc /f/service/controlDevice set_stcreenen_deabled_status/get_status privileges management] |
|---|
| Points | 20 |
|---|