| 标题 | JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution |
|---|
| 描述 | RCE exists in the cast_streen interface of JD Wireless Treasure router
The device received parameters from the user without strict processing and filtering, and directly concatenated them for command execution, resulting in RCE
You can find a reproduction video of the vulnerability at the following link https://my.feishu.cn/wiki/Umb6w4PasizunKkagYschZP1nff |
|---|
| 来源 | ⚠️ https://my.feishu.cn/wiki/Umb6w4PasizunKkagYschZP1nff |
|---|
| 用户 | ShiyuFan_BinYuan (UID 95126) |
|---|
| 提交 | 2026-02-03 09時55分 (3 月前) |
|---|
| 管理 | 2026-02-15 20時17分 (12 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 346169 [JingDong JD Cloud Box AX6600 直到 4.5.1.r4533 jdcweb_rpc /jdcapi cast_streen 文件 权限提升] |
|---|
| 积分 | 19 |
|---|