Description
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in coolsnowwolf lede (package/lean/mt/drivers/mt7603e/src/mt7603_wifi/common modules). This vulnerability is associated with program files bn_lib.C.

This issue affects lede: through r25.10.1.
Published: 2026-01-27
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Update
AI Analysis

Impact

The vulnerability arises from an unreachable exit condition in a loop within the mt7603 driver of the lede firmware. The flaw, categorized as CWE‑835, allows the loop to run indefinitely, consuming processor time and blocking normal operation. Because the loop never exits, a single instance can saturate the host, potentially causing the entire network subsystem to become unresponsive. While the description does not specify how the loop is triggered, the nature of the driver suggests that network traffic or a local configuration error could initiate the malfunction, making remote or local exploitation plausible.

Affected Systems

The issue affects the coolsnowwolf lede project. All releases up to and including r25.10.1 are impacted. The specific component affected is mt7603e driver within the mt7603_wifi common modules, located in the package/lean/mt/drivers/mt7603e/src/mt7603_wifi/common directory. Users running those firmware versions should be aware that the nested infinite loop exists.

Risk and Exploitability

The CVSS score for this flaw is 9.2, indicating a high impact. The EPSS score is reported as less than 1%, suggesting that the probability of exploitation in the wild is currently viewed as very low. The vulnerability is not listed in the CISA KEV catalog, meaning it has not yet been observed in widely deployed attacks. Nonetheless, the high severity combined with the denial‑of‑service outcome warrants timely action. Based on the description, an attacker that can influence the traffic or configuration handled by the mt7603 driver can trigger the infinite loop, leading to service disruption. The lack of an explicit exploit mention in the data means the exploit path is inferred; the attack could be carried out both locally by a privileged user and remotely via crafted wireless frames.

Generated by OpenCVE AI on April 18, 2026 at 02:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch provided in GitHub pull request 13368 to the mt7603e driver, ensuring the loop’s exit condition is restored.
  • Upgrade lede firmware to a release newer than r25.10.1, which incorporates the fix.
  • Restart the wireless driver and monitor CPU usage to confirm that the loop no longer consumes resources.
  • If an upgrade or patch cannot be applied immediately, disable or unload the mt7603 driver until a fix is available to prevent accidental execution.

Generated by OpenCVE AI on April 18, 2026 at 02:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Coolsnowwolf
Coolsnowwolf lede
Vendors & Products Coolsnowwolf
Coolsnowwolf lede

Tue, 27 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
Description Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in coolsnowwolf lede (package/lean/mt/drivers/mt7603e/src/mt7603_wifi/common modules). This vulnerability is associated with program files bn_lib.C. This issue affects lede: through r25.10.1.
Title A infinite loop vulnerability in coolsnowwolf/lede
Weaknesses CWE-835
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/S:N/AU:Y/R:U/V:C/RE:L/U:Amber'}


Subscriptions

Coolsnowwolf Lede
cve-icon MITRE

Status: PUBLISHED

Assigner: GovTech CSG

Published:

Updated: 2026-01-27T17:05:12.071Z

Reserved: 2026-01-27T08:39:10.280Z

Link: CVE-2026-24804

cve-icon Vulnrichment

Updated: 2026-01-27T17:05:08.273Z

cve-icon NVD

Status : Deferred

Published: 2026-01-27T09:15:50.470

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24804

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:30:15Z

Weaknesses