CVE-2026-24934
Severity CVSS v4.0:
MEDIUM
Type:
CWE-295
Improper Certificate Validation
Publication date:
03/02/2026
Last modified:
19/02/2026
Description
The DDNS function uses an insecure HTTP connection or fails to validate the SSL/TLS certificate when querying an external server for the device&#39;s WAN IP address. An unauthenticated remote attacker can perform a Man-in-the-Middle (MitM) attack to spoof the response, leading the device to update its DDNS record with an incorrect IP address.<br />
Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.
Impact
Base Score 4.0
6.30
Severity 4.0
MEDIUM
Base Score 3.x
3.70
Severity 3.x
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:asustor:data_master:*:*:*:*:*:*:*:* | 4.1.0.rhu2 (including) | 4.3.3.rof1 (including) |
| cpe:2.3:o:asustor:data_master:*:*:*:*:*:*:*:* | 5.0.0.ra82 (including) | 5.1.2.re51 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



