CVE-2026-24936
📋 TL;DR
An unauthenticated remote attacker can write arbitrary data to any file on Asustor ADM systems when a specific function is enabled during AD Domain joining. This allows complete system compromise by overwriting critical files. Affects Asustor ADM versions 4.1.0 through 4.3.3.ROF1 and 5.0.0 through 5.1.1.RCI1.
💻 Affected Systems
- Asustor ADM (Asustor Data Master)
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with root access, data destruction, or persistent backdoor installation.
Likely Case
System compromise leading to data theft, ransomware deployment, or lateral movement within the network.
If Mitigated
Limited impact if proper network segmentation and access controls prevent exploitation attempts.
🎯 Exploit Status
The vulnerability is in a specific CGI program with improper input validation, making exploitation straightforward once the attack vector is identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: ADM 4.3.4.RIY1 and ADM 5.1.2.RCJ1 or later
Vendor Advisory: https://www.asustor.com/security/security_advisory_detail?id=51
Restart Required: Yes
Instructions:
1. Log into ADM web interface. 2. Go to Settings > ADM Update. 3. Check for updates and install the latest version. 4. Reboot the system after update completion.
🔧 Temporary Workarounds
Disable AD Domain Joining Function
allTemporarily disable the specific function that triggers the vulnerability when joining an AD Domain.
Navigate to ADM Settings > Domain/LDAP and disable AD Domain joining if not required
Network Access Control
allRestrict network access to ADM web interface and management ports.
Use firewall rules to limit access to trusted IP addresses only
🧯 If You Can't Patch
- Isolate affected systems from internet and untrusted networks using firewall rules.
- Implement strict network segmentation to limit lateral movement if exploitation occurs.
🔍 How to Verify
Check if Vulnerable:
Check ADM version in web interface: Settings > ADM Update > Current Version. If version is between 4.1.0-4.3.3.ROF1 or 5.0.0-5.1.1.RCI1, system is vulnerable.
Check Version:
ssh admin@nas_ip 'cat /usr/builtin/etc/version' or check via ADM web interface
Verify Fix Applied:
Verify ADM version is 4.3.4.RIY1 or later for ADM 4.x, or 5.1.2.RCJ1 or later for ADM 5.x.
📡 Detection & Monitoring
Log Indicators:
- Unusual CGI program access logs
- Unexpected file write operations in system logs
- Failed or successful AD Domain join attempts from unknown sources
Network Indicators:
- Unusual HTTP requests to CGI endpoints from untrusted IPs
- Unexpected outbound connections from ADM system
SIEM Query:
source="ADM_logs" AND (cgi_program_access OR file_write_anomaly OR ad_domain_join_attempt)