Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46313: n/a

0
High
VulnerabilityCVE-2024-46313cvecve-2024-46313
Published: Mon Sep 30 2024 (09/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TP-Link WR941ND V6 has a stack overflow vulnerability in the ssid parameter in /userRpm/popupSiteSurveyRpm.htm.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:32:39 UTC

Technical Analysis

CVE-2024-46313 identifies a stack overflow vulnerability in the TP-Link WR941ND V6 router, specifically in the processing of the ssid parameter in the /userRpm/popupSiteSurveyRpm.htm web interface. This vulnerability arises from improper bounds checking when handling user-supplied input, leading to a classic stack-based buffer overflow (CWE-121). The flaw can be triggered remotely by an attacker with low privileges (PR:L) and requires no user interaction (UI:N), but the attacker must have access to the router's management interface, typically accessible over the local network (AV:A). The vulnerability affects the confidentiality, integrity, and availability of the device, as exploitation could allow arbitrary code execution, enabling attackers to take full control of the router. This could lead to interception or manipulation of network traffic, disruption of network services, or use of the device as a foothold for further attacks. The CVSS v3.1 base score of 8.0 reflects the high impact and relative ease of exploitation given the low complexity and no user interaction requirements. Although no known exploits are currently reported in the wild and no official patches have been released, the vulnerability poses a significant risk to affected users. The lack of patch availability necessitates immediate mitigation efforts to reduce exposure. The vulnerability is particularly concerning because routers are critical network infrastructure components, and compromise can have cascading effects on organizational security.

Potential Impact

The impact of CVE-2024-46313 is substantial for organizations using the TP-Link WR941ND V6 router. Exploitation can lead to full device compromise, allowing attackers to execute arbitrary code with the privileges of the router's management interface. This can result in interception and manipulation of all network traffic passing through the device, potentially exposing sensitive data and credentials. Attackers could also disrupt network availability by causing device crashes or reboots, or by modifying router configurations to degrade network performance or block legitimate traffic. Furthermore, compromised routers can serve as persistent footholds for attackers to launch lateral movement within internal networks or as platforms for launching attacks against external targets. Given the router's role as a gateway device, the vulnerability threatens the confidentiality, integrity, and availability of organizational networks. The absence of patches increases the risk window, and the requirement for network access to the management interface means that internal networks or poorly segmented environments are particularly vulnerable. Organizations relying on these routers in critical infrastructure, small to medium enterprises, or home office environments face significant operational and security risks.

Mitigation Recommendations

To mitigate CVE-2024-46313 effectively, organizations should first verify if they use the TP-Link WR941ND V6 router model. If so, immediate steps should include restricting access to the router's management interface to trusted administrators only, preferably via network segmentation or VPN access. Disable remote management features if enabled to reduce exposure. Monitor network traffic for unusual activity targeting the /userRpm/popupSiteSurveyRpm.htm endpoint or suspicious attempts to manipulate the ssid parameter. Employ network intrusion detection systems (NIDS) with custom signatures to detect potential exploitation attempts. Until an official patch is released, consider replacing affected devices with models that have received security updates or use alternative secure routers. Regularly check TP-Link's official channels for firmware updates addressing this vulnerability. Additionally, enforce strong administrative passwords and consider multi-factor authentication if supported. Conduct periodic security audits of network devices to identify and remediate similar vulnerabilities proactively. Finally, educate network administrators about this vulnerability and the importance of limiting management interface exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfcb7ef31ef0b56ab2c

Added to database: 2/25/2026, 9:43:24 PM

Last enriched: 2/26/2026, 8:32:39 AM

Last updated: 4/12/2026, 3:42:23 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses