TopVuln

High-risk vulnerability digests

CVE-2026-6644

  • CRITICAL

Details

CVSS v4
9.4
NVD published
2026-04-20 07:16:16
EPSS
0.4% probability · 58.3th percentile — 2026-05-12
Affected versions
Asustor ADM 4.1.0 - 4.3.3.RR42, ADM 5.0.0 - 5.1.2.REO1
Summary
This critical command injection vulnerability affects the PPTP VPN client component of Asustor ADM, the operating system for widely used Asustor network-attached storage (NAS) devices. Insufficient input validation allows an authenticated administrative attacker to execute arbitrary system commands on the underlying operating system. Successful exploitation results in full compromise of the affected NAS device.
Remediation
Apply the latest official security patch from Asustor for ADM to remediate this vulnerability. Restrict administrative access to the ADM web interface to only trusted network ranges. Disable PPTP VPN client functionality if it is not in use on affected devices.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.