Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24936: CWE-20 Improper Input Validation in ASUSTOR ADM

0
Critical
VulnerabilityCVE-2026-24936cvecve-2026-24936cwe-20
Published: Tue Feb 03 2026 (02/03/2026, 03:50:18 UTC)
Source: CVE Database V5
Vendor/Project: ASUSTOR
Product: ADM

Description

When a specific function is enabled while joining a AD Domain from ADM, an improper input parameters validation vulnerability in a specific CGI program allowing an unauthenticated remote attacker to write arbitrary data to any file on the system. By exploiting this vulnerability, attackers can overwrite critical system files, leading to a complete system compromise. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.

AI-Powered Analysis

AILast updated: 02/10/2026, 10:50:52 UTC

Technical Analysis

CVE-2026-24936 is a critical security vulnerability identified in ASUSTOR ADM, the operating system for ASUSTOR NAS devices. The flaw is categorized under CWE-20 (Improper Input Validation) and specifically affects a CGI program invoked when a particular function is enabled during the process of joining an Active Directory (AD) domain. This improper validation allows an unauthenticated remote attacker to supply crafted input parameters that result in arbitrary file write capabilities on the system. The attacker can overwrite any file, including critical system files, which can lead to complete system compromise, including potential remote code execution or persistent backdoors. The vulnerability affects ADM versions from 4.1.0 through 4.3.3.ROF1 and 5.0.0 through 5.1.1.RCI1. The CVSS 4.0 base score is 9.5, reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (all rated high). No patches or exploit code are currently publicly available, but the severity and ease of exploitation make this a critical risk. The vulnerability is particularly dangerous in environments where ADM devices are integrated with Active Directory, as the vulnerable function is tied to domain joining. This integration is common in enterprise and organizational networks, increasing the attack surface. The flaw's exploitation could allow attackers to gain persistent and deep access to NAS devices, potentially compromising stored data and network trust relationships.

Potential Impact

For European organizations, the impact of this vulnerability is significant. ASUSTOR ADM devices are widely used for centralized storage, backup, and file sharing in enterprises, SMBs, and critical infrastructure sectors. Exploitation could lead to unauthorized data modification, deletion, or theft, severely impacting confidentiality and integrity of sensitive information. The ability to overwrite system files can result in denial of service or persistent malware installation, threatening availability and operational continuity. Organizations relying on Active Directory integration with ADM devices face elevated risk due to the vulnerability's trigger condition. This could facilitate lateral movement within networks, escalating the threat to broader IT infrastructure. The lack of authentication and user interaction requirements means attackers can exploit this remotely and at scale, increasing the likelihood of targeted attacks or automated exploitation campaigns. Given the critical nature of NAS devices in data management and business operations, successful exploitation could disrupt services, cause financial losses, and damage reputations. Regulatory compliance risks also arise, especially under GDPR, if personal data is compromised or availability is impacted.

Mitigation Recommendations

Immediate mitigation steps include disabling the specific function related to AD domain joining in ADM if operationally feasible, to eliminate the attack vector until patches are available. Organizations should monitor network traffic to and from ADM devices for unusual or unauthorized access attempts, particularly targeting CGI endpoints. Implement strict network segmentation to isolate ADM devices from untrusted networks and limit exposure to the internet. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts. Regularly audit ADM device configurations and logs for suspicious activity. Once ASUSTOR releases patches addressing this vulnerability, prioritize their deployment in all affected environments. Additionally, enforce strong access controls and multi-factor authentication on management interfaces to reduce risk from other attack vectors. Backup critical data regularly and verify backup integrity to enable recovery in case of compromise. Engage with ASUSTOR support and security advisories for updates and guidance. Consider alternative secure storage solutions if patching or mitigation is delayed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ASUSTOR1
Date Reserved
2026-01-28T08:40:24.462Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6981764df9fa50a62fa17c96

Added to database: 2/3/2026, 4:15:09 AM

Last enriched: 2/10/2026, 10:50:52 AM

Last updated: 3/20/2026, 10:35:49 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses