提交 #750986: JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution信息

标题JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution
描述RCE exists in the cast_streen interface of JD Wireless Treasure router The device received parameters from the user without strict processing and filtering, and directly concatenated them for command execution, resulting in RCE You can find a reproduction video of the vulnerability at the following link https://my.feishu.cn/wiki/Umb6w4PasizunKkagYschZP1nff
来源⚠️ https://my.feishu.cn/wiki/Umb6w4PasizunKkagYschZP1nff
用户
 ShiyuFan_BinYuan (UID 95126)
提交2026-02-03 09時55分 (3 月前)
管理2026-02-15 20時17分 (12 days later)
状态已接受
VulDB条目346169 [JingDong JD Cloud Box AX6600 直到 4.5.1.r4533 jdcweb_rpc /jdcapi cast_streen 文件 权限提升]
积分19

Want to know what is going to be exploited?

We predict KEV entries!