Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32293: n/a

0
High
VulnerabilityCVE-2024-32293cvecve-2024-32293
Published: Wed Apr 17 2024 (04/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-32293 is a high-severity stack overflow vulnerability found in the Tenda W30E router firmware version V1. 0. 1. 25(633). The flaw exists in the fromDhcpListClient function, specifically via the page parameter, allowing an attacker with local network access and low privileges to execute arbitrary code without user interaction. Exploitation could lead to full compromise of the device, impacting confidentiality, integrity, and availability. No known exploits are currently in the wild, and no patches have been published yet. Organizations using Tenda W30E routers should prioritize mitigation to prevent potential exploitation. This vulnerability affects network infrastructure devices commonly deployed in residential and small office environments, with significant risk in countries where Tenda products have strong market presence. Due to the nature of the vulnerability, exploitation requires network access and low privileges but no user interaction, making it a critical threat to affected devices.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:15:41 UTC

Technical Analysis

CVE-2024-32293 is a stack overflow vulnerability identified in the Tenda W30E router firmware version V1.0.1.25(633). The vulnerability arises from improper handling of the page parameter within the fromDhcpListClient function. Stack overflow vulnerabilities occur when a program writes more data to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and enabling arbitrary code execution. In this case, an attacker with at least low-level privileges on the local network can craft a malicious request targeting the vulnerable parameter to trigger the overflow. The vulnerability does not require user interaction, increasing its risk profile. The CVSS v3.1 base score is 8.0, reflecting high impact on confidentiality, integrity, and availability, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), and unchanged scope (S:U). Although no public exploits have been reported, the vulnerability is critical due to the potential for remote code execution on network infrastructure devices. The affected device, Tenda W30E, is a consumer-grade wireless router often deployed in home and small office environments, making it a potential target for attackers seeking to compromise network gateways.

Potential Impact

Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the affected router, potentially gaining full control over the device. This can lead to interception or manipulation of network traffic, disruption of network services, and pivoting to other devices within the network. The compromise of a network gateway device like the Tenda W30E can severely impact confidentiality by exposing sensitive data, integrity by allowing malicious modifications to network configurations or traffic, and availability by causing device crashes or denial of service. Organizations relying on these routers for critical connectivity, especially in small office or home office scenarios, face increased risk of network breaches and persistent threats. The lack of available patches and known exploits in the wild suggests a window of exposure that attackers may attempt to exploit once proof-of-concept code becomes available.

Mitigation Recommendations

1. Immediately isolate affected Tenda W30E devices from untrusted networks to limit exposure. 2. Monitor network traffic for unusual activity indicative of exploitation attempts targeting the fromDhcpListClient function or malformed page parameters. 3. Implement network segmentation to restrict access to management interfaces of routers to trusted administrators only. 4. Contact Tenda support or monitor official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 5. Where possible, replace vulnerable devices with alternative routers that have a strong security track record and timely patching policies. 6. Employ intrusion detection systems (IDS) or intrusion prevention systems (IPS) with signatures or heuristics capable of detecting stack overflow attempts targeting this vulnerability. 7. Educate network administrators about the risk and signs of exploitation to enable rapid incident response. 8. Conduct regular security assessments of network infrastructure to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c33b7ef31ef0b561155

Added to database: 2/25/2026, 9:40:03 PM

Last enriched: 2/26/2026, 4:15:41 AM

Last updated: 2/26/2026, 6:18:25 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats