A vulnerability has been found in JD Cloud BE6500 4.4.1.r4308. This issue affects the function sub_4780 of the file /jdcapi. Such manipulation of the argument ddns_name leads to command injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
JD Cloud BE6500 jdcapi sub_4780 command injection
Problem type
Affected products
JD
4.4.1.r4308 - AFFECTED
References
https://vuldb.com/?id.338409
https://vuldb.com/?ctiid.338409
https://vuldb.com/?submit.707276
https://gist.github.com/isstabber/4ed3554130681e50b3e987c3c4ee1f29
GitHub Security Advisories
GHSA-p87w-9cw5-5fmp
A vulnerability has been found in JD Cloud BE6500 4.4.1.r4308. This issue affects the function...
https://github.com/advisories/GHSA-p87w-9cw5-5fmpA vulnerability has been found in JD Cloud BE6500 4.4.1.r4308. This issue affects the function sub_4780 of the file /jdcapi. Such manipulation of the argument ddns_name leads to command injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
https://nvd.nist.gov/vuln/detail/CVE-2025-15081
https://gist.github.com/isstabber/4ed3554130681e50b3e987c3c4ee1f29
https://vuldb.com/?ctiid.338409
https://vuldb.com/?id.338409
https://vuldb.com/?submit.707276
https://github.com/advisories/GHSA-p87w-9cw5-5fmp
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-15081Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-15081",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2025-12-26T16:37:10.227Z",
"dateReserved": "2025-12-25T09:29:08.682Z",
"datePublished": "2025-12-25T15:02:06.546Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2025-12-25T15:02:06.546Z"
},
"title": "JD Cloud BE6500 jdcapi sub_4780 command injection",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in JD Cloud BE6500 4.4.1.r4308. This issue affects the function sub_4780 of the file /jdcapi. Such manipulation of the argument ddns_name leads to command injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"affected": [
{
"vendor": "JD",
"product": "Cloud BE6500",
"versions": [
{
"version": "4.4.1.r4308",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Command Injection",
"cweId": "CWE-77",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Injection",
"cweId": "CWE-74",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.338409",
"name": "VDB-338409 | JD Cloud BE6500 jdcapi sub_4780 command injection",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.338409",
"name": "VDB-338409 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.707276",
"name": "Submit #707276 | JD cloud 京东云 JD Cloud BE6500 4.4.1.r4308 Command Injection",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://gist.github.com/isstabber/4ed3554130681e50b3e987c3c4ee1f29",
"tags": [
"exploit"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 6.5
}
}
],
"timeline": [
{
"time": "2025-12-25T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2025-12-25T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2025-12-25T10:34:13.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "Sta8r9 (VulDB User)",
"type": "reporter"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-12-26T16:37:10.227Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}