Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32317: n/a

0
High
VulnerabilityCVE-2024-32317cvecve-2024-32317
Published: Wed Apr 17 2024 (04/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-32317 is a high-severity stack overflow vulnerability found in Tenda AC10 v4. 0 routers running firmware versions V16. 03. 10. 13 and V16. 03. 10. 20. The flaw exists in the formWanParameterSetting function via the adslPwd parameter, allowing remote attackers to potentially execute code or cause denial of service. The vulnerability has a CVSS score of 7.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:16:41 UTC

Technical Analysis

CVE-2024-32317 identifies a stack overflow vulnerability in the Tenda AC10 v4.0 router firmware versions V16.03.10.13 and V16.03.10.20. The vulnerability is triggered via the adslPwd parameter within the formWanParameterSetting function. Stack overflow vulnerabilities (CWE-121) occur when a program writes more data to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and allowing attackers to execute arbitrary code or crash the system. In this case, the flaw is remotely exploitable over the network (AV:N), but requires high attack complexity (AC:H), meaning exploitation is difficult but feasible without authentication (PR:N) or user interaction (UI:N). The scope is classified as changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The CVSS vector shows a high impact on confidentiality (C:H), partial impact on integrity (I:L), and no impact on availability (A:N). This suggests attackers could gain access to sensitive information and alter some data but not disrupt service availability directly. No known exploits are currently in the wild, and no official patches have been released, which means the vulnerability is newly disclosed and unmitigated. The affected firmware versions correspond to a popular consumer router model, widely used in home and small office environments, potentially exposing many users to risk. The lack of patches necessitates immediate risk management and monitoring for exploit attempts.

Potential Impact

The vulnerability could allow remote attackers to execute arbitrary code or cause denial of service conditions on affected Tenda AC10 routers. This can lead to full compromise of the router’s confidentiality, exposing sensitive network configuration and traffic data. Partial integrity loss means attackers might alter configuration parameters or routing behavior, potentially enabling man-in-the-middle attacks or persistent network access. Although availability is not directly impacted, exploitation could indirectly disrupt network operations through instability or unauthorized configuration changes. Organizations relying on these routers for internet connectivity or as part of their network infrastructure face increased risk of data breaches, unauthorized access, and network manipulation. The absence of patches and public exploits means attackers may develop weaponized exploits, increasing the threat over time. The vulnerability’s presence in consumer-grade routers also raises concerns about widespread exploitation in home and small business environments, which often lack robust security monitoring.

Mitigation Recommendations

Until official patches are released, organizations should implement network-level protections such as firewall rules to restrict access to router management interfaces from untrusted networks. Disabling remote management features on affected devices can reduce exposure. Monitoring network traffic for unusual activity targeting the adslPwd parameter or formWanParameterSetting function may help detect exploitation attempts. Users should regularly check Tenda’s official channels for firmware updates and apply them promptly once available. Employing network segmentation to isolate vulnerable routers from critical systems can limit potential damage. Additionally, replacing affected routers with models from vendors with faster patch cycles or better security track records may be considered for high-risk environments. Security teams should also educate users about the risks and encourage strong password policies to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c35b7ef31ef0b56120f

Added to database: 2/25/2026, 9:40:05 PM

Last enriched: 2/26/2026, 4:16:41 AM

Last updated: 2/26/2026, 9:41:27 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats