CVE-2026-6644

9.1 CRITICAL
Published: April 20, 2026 Modified: April 30, 2026
View on NVD

Description

A command injection vulnerability was found in the PPTP VPN Clients on the ADM. The vulnerability allows an administrative user to break out of the restricted web environment and execute arbitrary code on the underlying operating system. This occurs due to insufficient validation of user-supplied input before it is passed to a system shell. Successful exploitation allows an attacker to achieve Remote Code Execution (RCE) and fully compromise the system. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.RR42 as well as from ADM 5.0.0 through ADM 5.1.2.REO1.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://https://www.asustor.com/security/security_advisory_detail?id=55
Source: security@asustor.com
Broken Link Vendor Advisory
https://uky007.github.io/CVE-2026-6644/
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0

2 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.1 / 10.0
EPSS (Exploit Probability)
0.4%
58th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

asustor