{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2562","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-15T19:17:10.095Z","datePublished":"2026-02-16T15:02:49.628Z","dateUpdated":"2026-02-23T10:11:59.788Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:11:59.788Z"},"title":"JingDong JD Cloud Box AX6600 jdcweb_rpc jdcapi cast_streen privileges management","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-269","lang":"en","description":"Improper Privilege Management"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"JingDong","product":"JD Cloud Box AX6600","versions":[{"version":"4.5.1.r4533","status":"affected"}],"modules":["jdcweb_rpc"]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. This impacts the function cast_streen of the file /jdcapi of the component jdcweb_rpc. Executing a manipulation of the argument File can lead to Remote Privilege Escalation. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-15T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-20T10:46:00.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ShiyuFan_BinYuan (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.346169","name":"VDB-346169 | JingDong JD Cloud Box AX6600 jdcweb_rpc jdcapi cast_streen privileges management","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.346169","name":"VDB-346169 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.750986","name":"Submit #750986 | JingDong Cloud NAS Router AX6600 (4.5.1.r4533 and earlier) Remote Command Execution","tags":["third-party-advisory"]},{"url":"https://my.feishu.cn/wiki/Umb6w4PasizunKkagYschZP1nff","tags":["exploit"]}]},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-269","lang":"en","description":"CWE-269 Improper Privilege Management"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-17T17:20:40.302738Z","id":"CVE-2026-2562","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-17T17:21:03.189Z"}}]}}