CVE-2026-24804

N/A Unknown

📋 TL;DR

This CVE describes an infinite loop vulnerability in the mt7603 WiFi driver module of the coolsnowwolf LEDE router firmware. An attacker could cause denial of service by triggering the infinite loop, potentially crashing the WiFi functionality. This affects LEDE firmware users running versions through r25.10.1.

💻 Affected Systems

Products:
  • coolsnowwolf LEDE firmware
Versions: through r25.10.1
Operating Systems: Linux-based router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects routers using the mt7603 WiFi driver module from the LEDE package repository.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete WiFi service disruption on affected routers, requiring physical reboot to restore functionality.

🟠

Likely Case

Local denial of service affecting WiFi connectivity on the router until system restart.

🟢

If Mitigated

Limited impact if WiFi interfaces are properly segmented and monitored for abnormal behavior.

🌐 Internet-Facing: MEDIUM - Requires network access to WiFi interface, but many routers have WiFi exposed by default.
🏢 Internal Only: MEDIUM - Internal attackers could disrupt local WiFi connectivity affecting other users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted packets to the WiFi interface, but specific exploit details are not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in LEDE commit after r25.10.1

Vendor Advisory: https://github.com/coolsnowwolf/lede/pull/13368

Restart Required: Yes

Instructions:

1. Update LEDE firmware to latest version. 2. Rebuild from source with the fix applied from the GitHub PR. 3. Reboot the router after update.

🔧 Temporary Workarounds

Disable vulnerable WiFi module

linux

Temporarily disable the mt7603 WiFi driver if not needed

rmmod mt7603e
echo 'blacklist mt7603e' >> /etc/modprobe.d/blacklist.conf

Restrict WiFi network access

all

Implement MAC address filtering and reduce WiFi broadcast range

🧯 If You Can't Patch

  • Segment WiFi network from critical infrastructure
  • Implement network monitoring for abnormal WiFi traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check LEDE version with 'cat /etc/openwrt_release' and verify if version is r25.10.1 or earlier

Check Version:

cat /etc/openwrt_release | grep 'DISTRIB_RELEASE'

Verify Fix Applied:

Verify the mt7603 driver version has been updated and test WiFi stability under load

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing mt7603 module crashes
  • High CPU usage from WiFi processes
  • Repeated WiFi interface resets

Network Indicators:

  • Unusual broadcast/multicast traffic to WiFi interface
  • WiFi connectivity drops affecting multiple clients

SIEM Query:

source="kernel" AND "mt7603" AND ("panic" OR "oops" OR "hung")

🔗 References

📤 Share & Export