Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32290: n/a

0
Medium
VulnerabilityCVE-2024-32290cvecve-2024-32290
Published: Wed Apr 17 2024 (04/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-32290 is a stack overflow vulnerability found in the Tenda W30E router firmware versions 1. 0 and 1. 0. 1. 25(633). The flaw exists in the fromAddressNat function, specifically via the page parameter, allowing an authenticated attacker with high privileges to potentially execute arbitrary code or cause denial of service. The vulnerability has a CVSS 3. 1 base score of 6. 7, indicating medium severity, with high impact on confidentiality and integrity but low impact on availability. Exploitation requires network access and high privileges but no user interaction.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:15:01 UTC

Technical Analysis

CVE-2024-32290 is a stack-based buffer overflow vulnerability identified in the firmware of the Tenda W30E router, specifically versions 1.0 and 1.0.1.25(633). The vulnerability arises from improper handling of the 'page' parameter within the fromAddressNat function, which leads to a stack overflow condition (CWE-121). This flaw can be exploited by an attacker who has high-level privileges on the device, typically requiring authentication, to overwrite the stack memory. Successful exploitation could allow arbitrary code execution with the privileges of the affected process or cause a denial of service by crashing the device. The vulnerability has a CVSS 3.1 score of 6.7, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H) and integrity (I:H), with low impact on availability (A:L). No public exploits or patches are currently available, which means the vulnerability is known but not yet actively exploited in the wild. The Tenda W30E is a consumer-grade wireless router, and the vulnerability could be leveraged to compromise network security, intercept or manipulate traffic, or disrupt network services.

Potential Impact

The impact of CVE-2024-32290 is significant for organizations and individuals using the Tenda W30E router. An attacker with network access and high privileges could exploit this vulnerability to execute arbitrary code, potentially gaining control over the device. This could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. The compromise of router firmware integrity undermines the security perimeter, enabling further lateral movement or persistent access for attackers. Although the availability impact is low, the high confidentiality and integrity impacts could result in data breaches or network compromise. Enterprises relying on these routers for critical connectivity or home users with sensitive data are at risk. The absence of known exploits in the wild currently reduces immediate threat but does not eliminate future risk, especially once exploit code becomes available. The vulnerability could also be leveraged in targeted attacks or supply chain compromises.

Mitigation Recommendations

To mitigate the risk posed by CVE-2024-32290, organizations and users should first restrict access to the router’s management interfaces, ensuring they are not exposed to untrusted networks or the internet. Implement strong authentication controls and limit administrative access to trusted personnel only. Network segmentation should be employed to isolate vulnerable devices from critical infrastructure. Monitor network traffic and device logs for unusual activity that could indicate exploitation attempts. Until an official firmware patch is released by Tenda, consider deploying compensating controls such as disabling unnecessary services or features related to the vulnerable function if possible. Regularly check for firmware updates from the vendor and apply them promptly once available. Additionally, organizations should evaluate the risk of continued use of affected devices and consider replacement with more secure hardware if timely patches are not forthcoming. Employing network intrusion detection systems (NIDS) to detect anomalous behavior targeting the router may also help in early detection of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c33b7ef31ef0b56114c

Added to database: 2/25/2026, 9:40:03 PM

Last enriched: 2/26/2026, 4:15:01 AM

Last updated: 2/26/2026, 8:00:38 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats