CVE-2026-3179 PUBLISHED

A path traversal vulnerability was found in the FTP Backup on the ADM.

Assigner: ASUSTOR1
Reserved: 25.02.2026 Published: 25.02.2026 Updated: 25.02.2026

The FTP Backup on the ADM does not properly sanitize filenames received from the FTP server when parsing directory listings. A malicious server or MITM attacker can craft filenames containing path traversal sequences, causing the client to write files outside the intended backup directory. A path traversal vulnerability may allow an attacker to overwrite arbitrary files on the system and potentially achieve privilege escalation or remote code execution. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.2.RE51.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.2

Product Status

Vendor ASUSTOR
Product ADM
Versions Default: unaffected
  • affected from 4.1.0 to 4.3.3.ROF1 (incl.)
  • affected from 5.0.0 to 5.1.2.RE51 (incl.)

Credits

  • Nuke finder

References

Problem Types

  • CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE

Impacts

  • CAPEC-126 Path Traversal