Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.RR42 as well as from ADM 5.0.0 through ADM 5.1.2.REO1.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 20 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Asustor
Asustor adm |
|
| Vendors & Products |
Asustor
Asustor adm |
Mon, 20 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow vulnerability was found in the VPN Clients on the ADM. The issue stems from the use of unbounded sscanf() and passing user-controlled data directly to printf(). Due to the lack of PIE and Stack Canary protections, an authenticated remote attacker can exploit these to execute arbitrary code as the web server user. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.RR42 as well as from ADM 5.0.0 through ADM 5.1.2.REO1. | |
| Title | A stack-based buffer overflow vulnerability in the VPN Clients on the ADM | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ASUSTOR1
Published:
Updated: 2026-04-20T13:46:07.764Z
Reserved: 2026-04-20T04:06:43.009Z
Link: CVE-2026-6643
Updated: 2026-04-20T13:44:50.037Z
Status : Received
Published: 2026-04-20T07:16:16.543
Modified: 2026-04-20T07:16:16.543
Link: CVE-2026-6643
No data.
OpenCVE Enrichment
Updated: 2026-04-20T08:30:02Z