Input Parameter Validation Flaw in ADM by Asustor
CVE-2026-24936

9.5CRITICAL

Key Information:

Vendor

Asustor

Status
Vendor
CVE Published:
3 February 2026

What is CVE-2026-24936?

CVE-2026-24936 is a vulnerability identified in the ADM (Asustor Data Master) operating system, which is utilized in Asustor NAS (Network Attached Storage) devices. This operating system is designed to provide users with comprehensive data management and storage capabilities. The vulnerability arises due to improper validation of input parameters within a specific CGI program when a user attempts to join an Active Directory (AD) domain. An unauthenticated remote attacker can exploit this flaw, enabling them to write arbitrary data to any file on the system. This capability allows attackers to potentially overwrite critical system files, leading to complete system compromise, which can significantly disrupt operations and jeopardize sensitive information.

Potential Impact of CVE-2026-24936

  1. System Compromise: The vulnerability allows unauthorized attackers to overwrite critical system files, which can lead to full control of the affected NAS devices and potentially expose sensitive data stored on them.

  2. Data Integrity and Availability Risks: By enabling remote attackers to alter system files, organizations may face threats to data integrity and availability, leading to loss of critical data and potential downtime for services relying on the affected NAS.

  3. Increased Attack Surface: With the possibility of exploitation, the attack surface for organizations using vulnerable Asustor products expands significantly, potentially attracting further malicious activity and increasing the likelihood of future incidents.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

ADM Linux 4.1.0 <= 4.3.3.ROF1

ADM Linux 5.0.0 <= 5.1.1.RCI1

References

CVSS V4

Score:
9.5
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Wilson Lu (@93wilsonlu), working with DEVCORE Internship Program
.