CVE-2026-3179

8.1 HIGH

📋 TL;DR

This path traversal vulnerability in ASUSTOR ADM FTP Backup allows attackers to access files outside the intended directory by manipulating file paths. It affects ASUSTOR NAS devices running ADM versions 4.1.0 through 4.3.3.ROF1 and 5.0.0 through 5.1.2.RE51 on Linux x86 and ARM platforms.

💻 Affected Systems

Products:
  • ASUSTOR ADM FTP Backup
Versions: ADM 4.1.0 through 4.3.3.ROF1, ADM 5.0.0 through 5.1.2.RE51
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both x86 and ARM architectures, 64-bit systems. Requires FTP backup service to be enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary file read/write, potentially leading to credential theft, data exfiltration, or remote code execution.

🟠

Likely Case

Unauthorized access to sensitive files including configuration files, backups, and user data stored on the NAS.

🟢

If Mitigated

Limited impact if FTP backup service is disabled or network access is restricted.

🌐 Internet-Facing: HIGH if FTP backup service is exposed to the internet without proper network segmentation.
🏢 Internal Only: MEDIUM as internal attackers could still exploit this to access sensitive data on the NAS.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ADM 4.3.4 and ADM 5.1.3 or later

Vendor Advisory: https://www.asustor.com/security/security_advisory_detail?id=53

Restart Required: Yes

Instructions:

1. Log into ADM web interface. 2. Go to Settings > ADM Update. 3. Check for updates and install latest version. 4. Reboot the NAS after update completes.

🔧 Temporary Workarounds

Disable FTP Backup Service

linux

Temporarily disable the vulnerable FTP backup service until patching is possible.

Navigate to ADM Settings > Services > FTP Backup and toggle to OFF

Network Segmentation

linux

Restrict network access to FTP backup service using firewall rules.

Use iptables: iptables -A INPUT -p tcp --dport 21 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 21 -j DROP

🧯 If You Can't Patch

  • Disable FTP backup service entirely if not required
  • Implement strict network access controls to limit FTP service to trusted IPs only

🔍 How to Verify

Check if Vulnerable:

Check ADM version in web interface: Settings > ADM Update. If version is between 4.1.0-4.3.3.ROF1 or 5.0.0-5.1.2.RE51, system is vulnerable.

Check Version:

ssh admin@nas_ip 'cat /etc/nas.conf | grep version' or check web interface

Verify Fix Applied:

Verify ADM version is 4.3.4+ or 5.1.3+ after update. Test FTP backup functionality with path traversal attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual FTP connection patterns
  • Failed path traversal attempts in FTP logs
  • Access to unexpected file paths

Network Indicators:

  • Multiple FTP connections with crafted path parameters
  • Unusual data transfer patterns via FTP

SIEM Query:

source="ftp.log" AND ("../" OR "/../" OR "..\" OR "%2e%2e%2f")

🔗 References

📤 Share & Export