{"id":"CVE-2026-24936","details":"When a specific function is enabled while joining a AD Domain from ADM, an improper input parameters validation vulnerability in a specific CGI program allowing an unauthenticated remote attacker to write arbitrary data to any file on the system. By exploiting this vulnerability, attackers can overwrite critical system files, leading to a complete system compromise.\nAffected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.","modified":"2026-03-13T04:10:30.225925Z","published":"2026-02-03T04:15:56.357Z","references":[{"type":"ADVISORY","url":"https://www.asustor.com/security/security_advisory_detail?id=51"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24936.json","unresolved_ranges":[{"events":[{"introduced":"4.1.0.rhu2"},{"last_affected":"4.3.3.rof1"}]},{"events":[{"introduced":"5.0.0.ra82"},{"fixed":"5.1.2.re51"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}