A stack-based buffer overflow vulnerability was found in the VPN Clients on the ADM. The issue stems from the use of unbounded sscanf() and passing user-controlled data directly to printf(). Due to the lack of PIE and Stack Canary protections, an authenticated remote attacker can exploit these to execute arbitrary code as the web server user.
Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.RR42 as well as from ADM 5.0.0 through ADM 5.1.2.REO1.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Asustor
Asustor adm |
|
| Vendors & Products |
Asustor
Asustor adm |
Mon, 20 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow vulnerability was found in the VPN Clients on the ADM. The issue stems from the use of unbounded sscanf() and passing user-controlled data directly to printf(). Due to the lack of PIE and Stack Canary protections, an authenticated remote attacker can exploit these to execute arbitrary code as the web server user. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.RR42 as well as from ADM 5.0.0 through ADM 5.1.2.REO1. | |
| Title | A stack-based buffer overflow vulnerability in the VPN Clients on the ADM | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ASUSTOR1
Published: 2026-04-20T06:34:27.511Z
Updated: 2026-04-20T06:34:27.511Z
Reserved: 2026-04-20T04:06:43.009Z
Link: CVE-2026-6643
No data.
Status : Received
Published: 2026-04-20T07:16:16.543
Modified: 2026-04-20T07:16:16.543
Link: CVE-2026-6643
No data.