Insecure DDNS Function in Asustor Devices Exposes Network to Attacks
CVE-2026-24934

6.3MEDIUM

Key Information:

Vendor

Asustor

Status
Vendor
CVE Published:
3 February 2026

What is CVE-2026-24934?

The DDNS function in Asustor ADM software lacks proper security measures by using an unsecured HTTP connection or failing to validate SSL/TLS certificates when requesting the device's WAN IP address from an external server. This oversight leaves the door open for unauthenticated remote attackers to exploit the system via a Man-in-the-Middle (MitM) attack, allowing them to spoof responses and mislead the device into updating its Dynamic Domain Name System (DDNS) record with an incorrect IP address, potentially causing serious network disruptions.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

ADM Linux 4.1.0 <= 4.3.3.ROF1

ADM Linux 5.0.0 <= 5.1.1.RCI1

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nuke
.