Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32287: n/a

0
Medium
VulnerabilityCVE-2024-32287cvecve-2024-32287
Published: Wed Apr 17 2024 (04/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-32287 is a stack overflow vulnerability found in the Tenda W30E router firmware version 1. 0. 1. 25(633). The flaw exists in the fromqossetting function, triggered via the qos parameter, and can be exploited remotely without authentication or user interaction. While the vulnerability does not impact confidentiality or integrity, it can cause a denial of service by crashing the device, impacting availability. No known exploits are currently in the wild, and no patches have been released yet. The CVSS 3. 1 base score is 6. 5, indicating a medium severity level.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:14:35 UTC

Technical Analysis

CVE-2024-32287 identifies a stack overflow vulnerability in the Tenda W30E router firmware version 1.0.1.25(633). The vulnerability arises from improper handling of the qos parameter within the fromqossetting function, leading to a stack-based buffer overflow (CWE-121). This flaw can be triggered remotely by an attacker without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:A/AC:L/PR:N/UI:N). Exploiting this vulnerability does not compromise confidentiality or integrity but can cause the device to crash, resulting in denial of service (availability impact). The vulnerability is rated medium severity with a CVSS score of 6.5. Currently, there are no known exploits in the wild and no patches have been published. The lack of patches means affected devices remain vulnerable, and mitigation relies on network controls and monitoring. The stack overflow nature of the flaw suggests that crafted input to the qos parameter can overwrite the call stack, potentially destabilizing the device’s firmware execution. This vulnerability is significant because routers are critical network infrastructure components, and disruption can affect entire networks relying on these devices.

Potential Impact

The primary impact of CVE-2024-32287 is a denial of service condition caused by the router crashing due to the stack overflow. This can disrupt network connectivity for users and organizations relying on the Tenda W30E router, potentially affecting business operations, communications, and internet access. Although the vulnerability does not allow for data theft or modification, the loss of availability can be critical in environments where continuous network uptime is essential, such as small businesses, home offices, or branch offices. The ease of remote exploitation without authentication increases the risk, especially if the device’s management interface or affected services are exposed to untrusted networks. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits in the future. Organizations with large deployments of Tenda routers could face widespread outages if targeted. Additionally, denial of service attacks can be used as a distraction or part of a larger attack campaign.

Mitigation Recommendations

1. Monitor Tenda’s official channels for firmware updates addressing CVE-2024-32287 and apply patches promptly once available. 2. Restrict remote access to the router’s management interfaces and services, ideally limiting access to trusted internal networks only. 3. Implement network segmentation to isolate critical systems from affected routers to minimize impact if a device is compromised or crashes. 4. Use firewall rules to block unauthorized traffic targeting the qos parameter or related services if possible. 5. Regularly audit network devices for firmware versions and replace or upgrade devices that cannot be patched. 6. Employ intrusion detection systems (IDS) or network monitoring tools to detect anomalous traffic patterns that may indicate exploitation attempts. 7. Educate network administrators about this vulnerability and encourage proactive security hygiene to reduce exposure. 8. Consider deploying redundant network paths or failover mechanisms to maintain availability in case of router failure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c33b7ef31ef0b561146

Added to database: 2/25/2026, 9:40:03 PM

Last enriched: 2/26/2026, 4:14:35 AM

Last updated: 2/26/2026, 11:14:42 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats