|Category:||Web application abuses|
|Title:||ASUSTOR ADM Authentication Bypass Vulnerability|
|Summary:||ASUSTOR ADM is prone to a authentication bypass vulnerability.|
ASUSTOR ADM is prone to a authentication bypass vulnerability.
The vulnerability lies in the web interface of ASUSTOR NAS, in the file
located in /initial/index.cgi, which responsible for initializing the device with your ASUSTOR ID. By abusing
/initial/index.cgi?act=register, it is possible to log in with the administrator privileges without any kind of
ASUSTOR ADM 3.0.5.RDU1 and prior.
Update to the latest version.
|Copyright||This script is Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.