CVE-2025-66848

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary commands remotely on affected JD Cloud NAS routers. Attackers can gain full control of vulnerable devices without any credentials. All users of specified JD Cloud router models with vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • JD Cloud NAS router AX1800
  • JD Cloud NAS router AX3000
  • JD Cloud NAS router AX6600
  • JD Cloud NAS router BE6500
  • JD Cloud NAS router ER1
  • JD Cloud NAS router ER2
Versions: AX1800: 4.3.1.r4308 and earlier, AX3000: 4.3.1.r4318 and earlier, AX6600: 4.5.1.r4533 and earlier, BE6500: 4.4.1.r4308 and earlier, ER1: 4.5.1.r4518 and earlier, ER2: 4.5.1.r4518 and earlier
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to network compromise, data theft, malware deployment, and use as pivot point for internal network attacks.

🟠

Likely Case

Device compromise leading to credential harvesting, DNS hijacking, botnet recruitment, and network surveillance.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them prime targets for remote exploitation.
🏢 Internal Only: MEDIUM - Internal-only devices still vulnerable to internal attackers or compromised hosts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated RCE with CVSS 9.8 suggests trivial exploitation. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - check vendor for updates

Vendor Advisory: https://www.jdcloud.com/cn/

Restart Required: Yes

Instructions:

1. Check JD Cloud website for firmware updates. 2. Download latest firmware for your model. 3. Upload via router admin interface. 4. Apply update and restart router.

🔧 Temporary Workarounds

Network Isolation

all

Place routers behind firewalls with strict inbound filtering

Access Control

all

Restrict management interface access to trusted IPs only

🧯 If You Can't Patch

  • Immediately isolate vulnerable routers from internet and critical internal networks
  • Implement strict network monitoring for suspicious traffic to/from router management interfaces

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface against affected versions list

Check Version:

Check via router web interface or SSH to router if available

Verify Fix Applied:

Verify firmware version is newer than affected versions after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in router logs
  • Unauthorized access attempts to management interfaces
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic to suspicious IPs from router
  • Port scanning originating from router

SIEM Query:

source_ip=router_ip AND (event_type="command_execution" OR dest_port=22,23,80,443,8080,8443 FROM external_ips)

🔗 References

📤 Share & Export