<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with asustor]]></title><description><![CDATA[A list of topics that have been tagged with asustor]]></description><link>https://board.circlewithadot.net/tags/asustor</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:01:58 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/asustor.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[🔥 CRITICAL: CVE-2026-6644 in ASUSTOR ADM PPTP VPN Clients (4.1.0 – 5.1.2.REO1) enables admin OS command injection (CVSS 9.4).]]></title><description><![CDATA[ CRITICAL: CVE-2026-6644 in ASUSTOR ADM PPTP VPN Clients (4.1.0 – 5.1.2.REO1) enables admin OS command injection (CVSS 9.4). Restrict admin access &amp; monitor for patches. Full compromise risk. Details: https://radar.offseq.com/threat/cve-2026-6644-cwe-78-improper-neutralization-of-sp-fee0276d #OffSeq #ASUSTOR #Vuln #RCE]]></description><link>https://board.circlewithadot.net/topic/fd27f388-e061-49aa-8221-ed57505199f6/critical-cve-2026-6644-in-asustor-adm-pptp-vpn-clients-4.1.0-5.1.2.reo1-enables-admin-os-command-injection-cvss-9.4-.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/fd27f388-e061-49aa-8221-ed57505199f6/critical-cve-2026-6644-in-asustor-adm-pptp-vpn-clients-4.1.0-5.1.2.reo1-enables-admin-os-command-injection-cvss-9.4-.</guid><dc:creator><![CDATA[offseq@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>