Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32303: n/a

0
High
VulnerabilityCVE-2024-32303cvecve-2024-32303
Published: Wed Apr 17 2024 (04/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-32303 is a high-severity stack overflow vulnerability affecting Tenda AC15 router firmware versions v15. 03. 20_multi, v15. 03. 05. 19, and v15. 03. 05. 18. The flaw exists in the fromWizardHandle function via the PPW parameter, allowing an authenticated attacker with low privileges to execute arbitrary code without user interaction.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:16:29 UTC

Technical Analysis

CVE-2024-32303 identifies a stack overflow vulnerability in the firmware of Tenda AC15 routers, specifically in versions v15.03.20_multi, v15.03.05.19, and v15.03.05.18. The vulnerability arises from improper handling of the PPW parameter within the fromWizardHandle function, which leads to a stack-based buffer overflow (CWE-121). This flaw can be triggered remotely over the network (Attack Vector: Adjacent Network) by an attacker who has low-level privileges (PR:L) on the device, without requiring any user interaction (UI:N). The vulnerability allows for complete compromise of the device’s confidentiality, integrity, and availability, enabling arbitrary code execution. The CVSS v3.1 base score is 8.0, reflecting the high impact and relative ease of exploitation given the low privilege requirement and lack of user interaction. Although no public exploits or patches are currently available, the vulnerability poses a significant risk to affected devices. The stack overflow nature of the flaw means that exploitation could lead to system crashes or persistent compromise, potentially allowing attackers to pivot into internal networks or disrupt critical services. The vulnerability affects a popular consumer and small business router model, which is widely deployed in various regions, increasing the potential attack surface.

Potential Impact

The exploitation of CVE-2024-32303 could have severe consequences for organizations and individuals using the affected Tenda AC15 routers. Successful exploitation allows attackers to execute arbitrary code with low privileges, potentially leading to full device compromise. This can result in unauthorized access to network traffic, interception of sensitive data, disruption of network services, and the use of compromised routers as footholds for further attacks within internal networks. The vulnerability threatens confidentiality by exposing sensitive information, integrity by allowing unauthorized modifications, and availability by causing device crashes or denial of service. Given the router’s role as a network gateway, compromised devices could facilitate man-in-the-middle attacks, malware distribution, or lateral movement. The lack of available patches increases the risk window, and the absence of known exploits in the wild suggests that proactive mitigation is critical to prevent future attacks.

Mitigation Recommendations

To mitigate the risks posed by CVE-2024-32303, organizations should take immediate and specific actions beyond generic advice: 1) Identify and inventory all Tenda AC15 routers in the environment, verifying firmware versions to confirm affected devices. 2) Restrict access to router management interfaces to trusted networks and users only, ideally isolating them from general user networks. 3) Disable remote management features if not strictly necessary, especially those accessible from adjacent networks. 4) Monitor network traffic for unusual activity or signs of exploitation attempts targeting the PPW parameter or related functions. 5) Employ network segmentation to limit the impact of a compromised router on critical assets. 6) Engage with Tenda support channels to obtain or request firmware updates or patches addressing this vulnerability. 7) If patching is not immediately available, consider temporary replacement of affected devices with models not impacted by this vulnerability. 8) Implement strong authentication and regularly update credentials on all network devices to reduce the risk of unauthorized access. 9) Maintain up-to-date intrusion detection and prevention systems configured to detect exploitation patterns related to stack overflow attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c33b7ef31ef0b561161

Added to database: 2/25/2026, 9:40:03 PM

Last enriched: 2/26/2026, 4:16:29 AM

Last updated: 2/26/2026, 9:34:38 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats