Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-24803

CVE-2026-24803: Lede MT7615d Driver DoS Vulnerability

CVE-2026-24803 is an infinite loop denial of service vulnerability in coolsnowwolf lede MT7615d wireless driver that can cause system unavailability. This article covers technical details, affected versions, and mitigation.

Published: January 30, 2026

CVE-2026-24803 Overview

CVE-2026-24803 is a Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability affecting the coolsnowwolf LEDE firmware distribution, specifically within the MT7615D WiFi driver security modules. The vulnerability exists in the bn_lib.C program file within the package/lean/mt/drivers/mt7615d/src/mt_wifi/embedded/security modules.

This infinite loop vulnerability (CWE-835) can be triggered remotely over the network without requiring authentication or user interaction. When exploited, the vulnerability causes the affected device to enter a non-recoverable processing state, resulting in complete denial of service for both the device and potentially downstream network segments that depend on it.

Critical Impact

Network-accessible infinite loop vulnerability in WiFi driver security modules can cause complete device unavailability and downstream network disruption without authentication requirements.

Affected Products

  • coolsnowwolf LEDE through version r25.10.1
  • MT7615D WiFi driver security modules (mt_wifi/embedded/security)
  • Devices utilizing the affected bn_lib.C implementation

Discovery Timeline

  • 2026-01-27 - CVE-2026-24803 published to NVD
  • 2026-01-27 - Last updated in NVD database

Technical Details for CVE-2026-24803

Vulnerability Analysis

The vulnerability resides in the bn_lib.C file, which handles big number (BN) cryptographic library operations within the WiFi driver's security stack. The infinite loop condition occurs when specific input conditions cause the loop termination logic to become unreachable, resulting in the processor being trapped in an endless execution cycle.

This type of vulnerability in WiFi driver security modules is particularly concerning because the affected code path handles network-sourced security operations. An attacker can craft malicious network packets that trigger the vulnerable code path, causing the device to become completely unresponsive.

The network attack vector combined with no authentication requirements means that any device running the vulnerable LEDE firmware version with the MT7615D driver is at risk from any attacker with network access to the device.

Root Cause

The root cause is a loop construct within bn_lib.C that contains an exit condition which cannot be satisfied under certain input scenarios. This is classified as CWE-835 (Loop with Unreachable Exit Condition). The big number library operations likely involve iterative calculations where boundary conditions or edge cases were not properly validated, allowing crafted input to create a state where the loop's termination condition is mathematically impossible to reach.

Attack Vector

The attack can be executed remotely over the network (AV:N) with low complexity (AC:L). The attacker requires no privileges or authentication (PR:N) and no user interaction is needed (UI:N). The vulnerability primarily impacts availability, causing high availability impact to both the vulnerable system (VA:H) and subsequent downstream systems (SA:H).

An attacker would target the WiFi driver's security processing by sending specially crafted wireless frames or network packets that are processed by the vulnerable bn_lib.C code. Once the infinite loop is triggered, the device becomes unresponsive and requires a hard reset to recover functionality.

Detection Methods for CVE-2026-24803

Indicators of Compromise

  • Device becomes completely unresponsive with no network connectivity
  • High CPU utilization on the WiFi driver process or kernel thread
  • System logs may show security module processing initiated but never completing
  • Network timeouts from devices dependent on the affected WiFi access point

Detection Strategies

  • Monitor for abnormal CPU utilization patterns on embedded devices running LEDE firmware
  • Implement network monitoring to detect sudden connectivity losses from LEDE-based access points
  • Deploy watchdog timers to detect and alert on device unresponsiveness
  • Review logs for unusual patterns in WiFi security handshake processing

Monitoring Recommendations

  • Configure SNMP or similar monitoring for device availability and response times
  • Implement automated alerting for network segment outages affecting LEDE devices
  • Set up periodic connectivity health checks to affected access points
  • Monitor for unusual wireless client connection patterns that may indicate exploitation attempts

How to Mitigate CVE-2026-24803

Immediate Actions Required

  • Identify all devices running coolsnowwolf LEDE firmware version r25.10.1 or earlier
  • Restrict network access to affected devices where possible using firewall rules
  • Implement network segmentation to limit the blast radius of potential exploitation
  • Plan for firmware updates once patches become available

Patch Information

A fix for this vulnerability is discussed in the GitHub Pull Request #13346 for the coolsnowwolf LEDE repository. Administrators should monitor this pull request for merge status and update their firmware builds accordingly once the fix is incorporated.

Users building LEDE from source should apply the patch from the pull request to their local builds. Those using pre-built firmware images should wait for updated releases that incorporate the security fix.

Workarounds

  • Limit network exposure of affected devices by placing them behind firewalls with strict access controls
  • Disable or restrict access to the WiFi security features if operationally feasible (may reduce security posture)
  • Implement hardware watchdog timers to automatically reboot devices that become unresponsive
  • Consider temporary migration to alternative firmware or hardware until patches are available
bash
# Example: Restrict network access to LEDE device management interface
iptables -A INPUT -p tcp --dport 22 -s 192.168.1.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP
iptables -A INPUT -p tcp --dport 80 -s 192.168.1.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechLede

  • SeverityCRITICAL

  • CVSS Score9.2

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:C/RE:L/U:Amber
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-835
  • Technical References
  • GitHub Pull Request Discussion
  • Related CVEs
  • CVE-2026-24804: coolsnowwolf lede DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English