{
  "affected": [
    {
      "database_specific": {
        "unresolved_ranges": [
          {
            "events": [
              {
                "introduced": "4.1.0.rhu2"
              },
              {
                "last_affected": "4.3.3.rof1"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "5.0.0.ra82"
              },
              {
                "fixed": "5.1.2.re51"
              }
            ]
          }
        ]
      }
    }
  ],
  "details": "When a specific function is enabled while joining a AD Domain from ADM, an improper input parameters validation vulnerability in a specific CGI program allowing an unauthenticated remote attacker to write arbitrary data to any file on the system. By exploiting this vulnerability, attackers can overwrite critical system files, leading to a complete system compromise.\nAffected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.",
  "id": "CVE-2026-24936",
  "modified": "2026-03-10T21:53:55.111251683Z",
  "published": "2026-02-03T04:15:56.357Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://www.asustor.com/security/security_advisory_detail?id=51"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}