Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24803: CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop') in coolsnowwolf lede

0
Critical
VulnerabilityCVE-2026-24803cvecve-2026-24803cwe-835
Published: Tue Jan 27 2026 (01/27/2026, 08:39:39 UTC)
Source: CVE Database V5
Vendor/Project: coolsnowwolf
Product: lede

Description

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in coolsnowwolf lede (package/lean/mt/drivers/mt7615d/src/mt_wifi/embedded/security modules). This vulnerability is associated with program files bn_lib.C. This issue affects lede: through r25.10.1.

AI-Powered Analysis

AILast updated: 01/27/2026, 09:05:35 UTC

Technical Analysis

CVE-2026-24803 identifies a critical vulnerability classified as CWE-835 (Loop with Unreachable Exit Condition) in the coolsnowwolf LEDE open-source router firmware, specifically within the mt7615d Wi-Fi driver's embedded security modules. The vulnerability resides in the bn_lib.C source file, where a loop is constructed without a reachable exit condition, effectively causing an infinite loop during execution. This flaw affects all versions of coolsnowwolf LEDE up to and including r25.10.1. The infinite loop can be triggered remotely without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The impact of this infinite loop is a denial of service (DoS) condition, where the affected device's availability is severely compromised due to the CPU being stuck in the loop, rendering the device unresponsive. The CVSS v4.0 base score of 9.2 reflects the critical severity, emphasizing the ease of exploitation and the high impact on availability. No patches or fixes have been published at the time of disclosure, and no known exploits are currently active in the wild. The vulnerability is particularly relevant for devices using the mt7615d Wi-Fi chipset running the coolsnowwolf LEDE firmware, which is popular in custom router firmware communities and embedded device deployments. The infinite loop could be exploited by an attacker sending crafted network packets to the vulnerable device, causing it to enter the loop and disrupt normal operations.

Potential Impact

For European organizations, the primary impact of CVE-2026-24803 is a denial of service on network devices running the coolsnowwolf LEDE firmware with the mt7615d Wi-Fi driver. This can lead to network outages, loss of connectivity, and potential disruption of critical services relying on these devices. Organizations in sectors such as telecommunications, ISPs, and enterprises using custom or embedded routers with this firmware are at heightened risk. The unavailability of affected devices could impair business continuity, especially in environments where redundancy is limited or where these devices serve as critical network infrastructure. Additionally, the lack of authentication and user interaction requirements means attackers can remotely exploit this vulnerability without prior access, increasing the threat surface. Although no known exploits exist yet, the critical CVSS score suggests that once exploit code is developed, attacks could become widespread. The impact on confidentiality and integrity is minimal, but the availability impact is severe, potentially affecting operational technology and IoT deployments common in European industries.

Mitigation Recommendations

1. Immediate mitigation should focus on network segmentation and access control to limit exposure of vulnerable devices to untrusted networks, especially the internet. 2. Employ firewall rules to restrict inbound traffic to the affected devices, allowing only trusted management hosts. 3. Monitor network traffic for unusual patterns that could indicate attempts to trigger the infinite loop. 4. Engage with the coolsnowwolf LEDE community and vendor channels to track the release of official patches or firmware updates addressing this vulnerability. 5. Where possible, replace or upgrade affected devices with versions not using the vulnerable mt7615d driver or switch to alternative firmware distributions with patches applied. 6. Implement redundancy and failover mechanisms in network design to mitigate potential downtime caused by device unavailability. 7. Conduct internal audits to inventory devices running coolsnowwolf LEDE firmware and assess exposure. 8. Prepare incident response plans specifically for denial of service scenarios affecting network infrastructure. 9. Avoid deploying untrusted or unverified network packets to vulnerable devices by employing intrusion detection/prevention systems (IDS/IPS) with custom rules once exploit signatures become available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GovTech CSG
Date Reserved
2026-01-27T08:39:10.280Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69787c804623b1157c108bd9

Added to database: 1/27/2026, 8:51:12 AM

Last enriched: 1/27/2026, 9:05:35 AM

Last updated: 2/7/2026, 11:17:15 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats