Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Feb 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Asustor data Master
|
|
| CPEs | cpe:2.3:o:asustor:data_master:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Asustor data Master
|
|
| Metrics |
cvssV3_1
|
Wed, 04 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Asustor
Asustor adm |
|
| Vendors & Products |
Asustor
Asustor adm |
Tue, 03 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When a specific function is enabled while joining a AD Domain from ADM, an improper input parameters validation vulnerability in a specific CGI program allowing an unauthenticated remote attacker to write arbitrary data to any file on the system. By exploiting this vulnerability, attackers can overwrite critical system files, leading to a complete system compromise. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1. | |
| Title | An improper input validation vulnerability was found in ADM while joining a AD Domain. | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ASUSTOR1
Published:
Updated: 2026-02-04T16:12:51.388Z
Reserved: 2026-01-28T08:40:24.462Z
Link: CVE-2026-24936
Updated: 2026-02-04T16:12:46.572Z
Status : Analyzed
Published: 2026-02-03T04:15:56.357
Modified: 2026-02-19T17:39:07.473
Link: CVE-2026-24936
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:13:58Z