Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46325: n/a

0
Medium
VulnerabilityCVE-2024-46325cvecve-2024-46325
Published: Mon Oct 07 2024 (10/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TP-Link WR740N V6 has a stack overflow vulnerability via the ssid parameter in /userRpm/popupSiteSurveyRpm.htm url.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:33:15 UTC

Technical Analysis

CVE-2024-46325 identifies a stack overflow vulnerability in the TP-Link WR740N V6 router, specifically triggered via the ssid parameter in the /userRpm/popupSiteSurveyRpm.htm endpoint. Stack overflow vulnerabilities (CWE-121) occur when a program writes more data to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and leading to undefined behavior including crashes or arbitrary code execution. In this case, the vulnerability is exploitable remotely but requires the attacker to have local network access and low privileges (PR:L), with no user interaction needed (UI:N). The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via VPN. The CVSS v3.1 base score is 5.5 (medium), reflecting limited confidentiality, integrity, and availability impacts (C:L/I:L/A:L). The vulnerability could allow an attacker to cause denial of service or potentially execute code with the privileges of the router’s web management process. No patches or mitigations have been officially released yet, and no known exploits are reported in the wild. The affected device is a widely deployed consumer-grade router model, commonly used in home and small office environments. The vulnerability highlights the importance of secure input validation in embedded web interfaces of network devices.

Potential Impact

The primary impact of CVE-2024-46325 is on the availability and integrity of the affected TP-Link WR740N V6 routers. Exploitation could cause the device to crash or reboot, resulting in denial of service for users relying on the router for internet connectivity. There is also a potential risk of partial compromise of the router’s firmware or execution of arbitrary code, which could lead to interception or manipulation of network traffic, undermining confidentiality and integrity. Since the vulnerability requires local network access and low privileges, attackers would typically need to be inside the victim’s network or have VPN access, limiting remote exploitation risks. However, in environments where the router’s management interface is exposed or poorly segmented, the risk increases. Organizations relying on these devices for critical connectivity or as part of IoT infrastructure could face operational disruptions and increased exposure to further attacks if exploited. The absence of patches and known exploits suggests the threat is currently theoretical but should be addressed proactively.

Mitigation Recommendations

1. Restrict access to the router’s management interface by limiting it to trusted internal networks and disabling remote management if not required. 2. Implement network segmentation to isolate the router’s management interface from general user networks, reducing the risk of local network attackers. 3. Monitor network traffic for unusual requests targeting the /userRpm/popupSiteSurveyRpm.htm endpoint or abnormal SSID parameter values. 4. Regularly check TP-Link’s official support channels for firmware updates or security advisories addressing this vulnerability. 5. If possible, replace or upgrade affected devices with models that have received security patches or have more robust input validation. 6. Employ network intrusion detection systems (NIDS) with signatures for stack overflow attempts or malformed HTTP requests targeting router web interfaces. 7. Educate users about the risks of exposing router management interfaces and the importance of strong local network security controls. 8. Consider disabling SSID scanning features or related services if not necessary, to reduce the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfcb7ef31ef0b56ab32

Added to database: 2/25/2026, 9:43:24 PM

Last enriched: 2/26/2026, 8:33:15 AM

Last updated: 4/12/2026, 9:16:06 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses