CVE-2026-24934 PUBLISHED

An improper certificate validation vulnerability was found in ADM while querying an external server for the device's WAN IP address.

Assigner: ASUSTOR1
Reserved: 28.01.2026 Published: 03.02.2026 Updated: 03.02.2026

The DDNS function uses an insecure HTTP connection or fails to validate the SSL/TLS certificate when querying an external server for the device's WAN IP address. An unauthenticated remote attacker can perform a Man-in-the-Middle (MitM) attack to spoof the response, leading the device to update its DDNS record with an incorrect IP address. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
CVSS Score: 6.3

Product Status

Vendor ASUSTOR
Product ADM
Versions Default: unaffected
  • affected from 4.1.0 to 4.3.3.ROF1 (incl.)
  • affected from 5.0.0 to 5.1.1.RCI1 (incl.)

Credits

  • Nuke reporter

References

Problem Types

  • CWE-295 Improper Certificate Validation CWE

Impacts

  • CAPEC-158 Sniffing Network Traffic