AdGuard Home Issues Emergency Hotfix to Address Critical Vulnerability
AdGuard Home, a prominent solution for network-wide ad and tracker blocking, has recently found itself at the center of a significant security concern, prompting the issuance of an emergency hotfix aimed at addressing a critical vulnerability. This urgency highlights the importance of maintaining robust cybersecurity measures, especially as threats consistently evolve.
The vulnerability in question has been officially tracked by the identifier CVE-2026-32136 and has garnered a maximum severity rating of 9.8 out of 10 on the Common Vulnerability Scoring System (CVSS) scale. Such a high score reflects the potential risk that this flaw poses to users who rely on AdGuard Home to secure their networks against unwanted ads and malicious trackers.
Exploiting this security defect allows unauthenticated attackers to seamlessly bypass the software’s built-in login mechanisms. What makes this issue particularly alarming is that, by taking advantage of this vulnerability, malicious actors can gain unfettered administrative privileges over the affected systems without ever needing to submit valid user credentials. This scenario paints a concerning picture for users, emphasizing the critical need for immediate action to safeguard their devices.
Discovery and Disclosure
The dangerous authentication bypass issue was initially discovered and responsibly reported by a security researcher known in the industry as mandreko. Upon receiving notification of this vulnerability, the AdGuard development team rapidly verified the severity of the issue. Their response was timely and coordinated, as they submitted the details of the flaw to relevant public vulnerability databases to ensure the information was accessible to the wider community.
Recognizing the extreme risks posed to users worldwide, the maintainers at AdGuard moved swiftly to develop and publish the version 0.107.73 hotfix. Their prompt reaction shows a commitment to securing users’ networks before cybercriminals could have the chance to exploit the vulnerability on a larger scale.
The underlying cause of this vulnerability can be traced back to how unpatched versions of AdGuard Home handle specific network connection upgrade requests. The attack sequence commences when a remote threat actor sends what appears to be a standard HTTP/1.1 request to the targeted AdGuard server. Hidden within this malicious request is a specific command that instructs the server to upgrade the ongoing connection to HTTP/2 Cleartext, commonly known as h2c.
Once the server accepts this upgrade, it channels the resulting HTTP/2 connection directly into an internal multiplexer that lacks the essential authentication middleware. Consequently, all subsequent HTTP/2 requests transmitted over this newly established channel are automatically recognized by the system as fully authenticated, effectively handing over unrestricted administrative control to the attacker.
Steps to Address the Threat
In response to this severe threat, the AdGuard development team successfully addressed the vulnerability by implementing strict authentication protocols for all requests upgraded from h2c to public resources. This patch serves as a critical safeguard, ensuring that only authorized requests can access vital system resources.
System administrators and individual home users are being urged to take immediate action to protect their environments. The primary remediation step is to update all active AdGuard Home instances to version 0.107.73 or a newer release. This essential measure immediately mitigates the identified risks.
Additionally, network administrators are strongly advised to review their firewall configurations rigorously. Ensuring that public internet access to the AdGuard Home management interface remains strictly blocked can prevent potential exploitation. This step reflects a proactive approach to maintain the integrity and security of network environments.
Finally, security teams should undertake comprehensive audits of existing DNS routing rules and access logs. These reviews are crucial for identifying any unauthorized configuration changes that may indicate prior compromises. By maintaining vigilance and regular assessments, organizations can better shield themselves from potential security breaches.
As cybersecurity threats continue to evolve, it is imperative for users and organizations alike to remain vigilant and proactive. By addressing vulnerabilities as they arise and implementing robust protective measures, users can better safeguard their digital environments against the increasing tide of cyber threats.

