Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-3179
PUBLISHED
More InfoOfficial Page
Assigner-ASUSTOR1
Assigner Org ID-f35eaae9-79f2-4d0d-a5c7-7bea6ed6be77
View Known Exploited Vulnerability (KEV) details
Published At-25 Feb, 2026 | 05:55
Updated At-25 Feb, 2026 | 17:41
Rejected At-
▼CVE Numbering Authority (CNA)
A path traversal vulnerability was found in the FTP Backup on the ADM.

The FTP Backup on the ADM does not properly sanitize filenames received from the FTP server when parsing directory listings. A malicious server or MITM attacker can craft filenames containing path traversal sequences, causing the client to write files outside the intended backup directory. A path traversal vulnerability may allow an attacker to overwrite arbitrary files on the system and potentially achieve privilege escalation or remote code execution. Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.2.RE51.

Affected Products
Vendor
ASUSTOR Inc.ASUSTOR
Product
ADM
Package Name
FTP Backup
Platforms
  • Linux
  • x86
  • ARM
  • 64 bit
Default Status
unaffected
Versions
Affected
  • From 4.1.0 through 4.3.3.ROF1 (custom)
  • From 5.0.0 through 5.1.2.RE51 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-22CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Type: CWE
CWE ID: CWE-22
Description: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Metrics
VersionBase scoreBase severityVector
4.09.2CRITICAL
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 9.2
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-126CAPEC-126 Path Traversal
CAPEC ID: CAPEC-126
Description: CAPEC-126 Path Traversal
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Nuke
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.asustor.com/security/security_advisory_detail?id=53
vendor-advisory
Hyperlink: https://www.asustor.com/security/security_advisory_detail?id=53
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found