CVE-2026-32136

CRITICAL

AdGuard Home <0.107.73 - Auth Bypass

Title source: llm
STIX 2.1

Description

AdGuard Home is a network-wide software for blocking ads and tracking. Prior to 0.107.73, an unauthenticated remote attacker can bypass all authentication in AdGuardHome by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (h2c). Once the upgrade is accepted, the resulting HTTP/2 connection is handled by the inner mux, which has no authentication middleware attached. All subsequent HTTP/2 requests on that connection are processed as fully authenticated, regardless of whether any credentials were provided. This vulnerability is fixed in 0.107.73.

Exploits (1)

github WORKING POC
by 0xdak · pythonpoc
https://github.com/0xdak/CVE-2026-32136_exploit

Scores

CVSS v3 9.8
EPSS 0.0092
EPSS Percentile 76.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-287
Status published
Products (2)
adguard/adguardhome < 0.107.73
AdguardTeam/AdGuardHome 0 - 0.107.73Go
Published Mar 11, 2026
Tracked Since Mar 12, 2026