Vulnerability Description
A command injection vulnerability was found in the PPTP VPN Clients on the ADM. The vulnerability allows an administrative user to break out of the restricted web environment and execute arbitrary code on the underlying operating system. This occurs due to insufficient validation of user-supplied input before it is passed to a system shell. Successful exploitation allows an attacker to achieve Remote Code Execution (RCE) and fully compromise the system. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.RR42 as well as from ADM 5.0.0 through ADM 5.1.2.REO1.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asustor | Data Master | >= 4.1.0.rhu2, < 4.3.3.RR42 |
Related Weaknesses (CWE)
References
- https://https://www.asustor.com/security/security_advisory_detail?id=55Broken LinkVendor Advisory
- https://uky007.github.io/CVE-2026-6644/
FAQ
What is CVE-2026-6644?
CVE-2026-6644 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A command injection vulnerability was found in the PPTP VPN Clients on the ADM. The vulnerability allows an administrative user to break out of the restricted web environment and execute arbitrary cod...
How severe is CVE-2026-6644?
CVE-2026-6644 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-6644?
Check the references section above for vendor advisories and patch information. Affected products include: Asustor Data Master.