CVE-2026-6644
Received Received - Intake
Command Injection in ADM PPTP VPN Client Enables RCE

Publication date: 2026-04-20

Last updated on: 2026-04-30

Assigner: ASUSTOR, Inc.

Description
A command injection vulnerability was found in the PPTP VPN Clients on the ADM. The vulnerability allows an administrative user to break out of the restricted web environment and execute arbitrary code on the underlying operating system. This occurs due to insufficient validation of user-supplied input before it is passed to a system shell. Successful exploitation allows an attacker to achieve Remote Code Execution (RCE) and fully compromise the system. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.RR42 as well as from ADM 5.0.0 through ADM 5.1.2.REO1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-20
Last Modified
2026-04-30
Generated
2026-05-07
AI Q&A
2026-04-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
asustor data_master From 5.0.0.ra82 (inc) to 5.1.2.reo1 (exc)
asustor data_master From 4.1.0.rhu2 (inc) to 4.3.3.RR42 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a command injection flaw found in the PPTP VPN Clients on the ADM platform. It allows an administrative user to escape the restricted web environment and execute arbitrary code on the underlying operating system.

The root cause is insufficient validation of user-supplied input before it is passed to a system shell, which enables an attacker to perform Remote Code Execution (RCE) and fully compromise the system.


How can this vulnerability impact me? :

Successful exploitation of this vulnerability allows an attacker to execute arbitrary code remotely with administrative privileges, leading to a full compromise of the affected system.

  • Remote Code Execution (RCE) on the underlying operating system.
  • Complete system compromise including potential data theft, system manipulation, or disruption of services.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart