CVE-2024-30586: n/a
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the security_5g parameter of the formWifiBasicSet function.
AI Analysis
Technical Summary
CVE-2024-30586 identifies a stack overflow vulnerability in the Tenda FH1202 router firmware version 1.2.0.14(408). The flaw resides in the handling of the security_5g parameter within the formWifiBasicSet function. Specifically, improper bounds checking or input validation allows crafted input to overflow the stack, potentially overwriting control data and causing the device to crash or reboot unexpectedly. This vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). Exploitation requires an attacker to have adjacent network access (AV:A), but no privileges or user interaction are necessary. The impact is limited to availability (A:H), meaning the attacker can cause denial of service but cannot compromise confidentiality or integrity. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability affects a specific firmware version of the Tenda FH1202, a consumer-grade wireless router commonly used in home and small office environments. The medium CVSS score of 6.5 reflects the moderate risk posed by this vulnerability due to the limited attack vector and impact scope.
Potential Impact
The primary impact of CVE-2024-30586 is denial of service, which can disrupt network connectivity and availability for users relying on the Tenda FH1202 router. This can affect home users, small businesses, and potentially larger organizations if these devices are deployed in critical network segments. The inability to maintain stable wireless connectivity can lead to operational downtime, loss of productivity, and potential cascading effects if the router serves as a gateway or critical network node. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized access are unlikely through this flaw alone. However, denial of service in network infrastructure can indirectly impact business continuity and user experience. The lack of known exploits reduces immediate risk, but the absence of patches means the vulnerability remains exploitable if discovered by attackers.
Mitigation Recommendations
1. Restrict network access to the router's management interfaces, especially from untrusted or external networks, to limit exposure to adjacent attackers. 2. Monitor Tenda's official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 3. If possible, disable or restrict the use of the 5G wireless band or the affected configuration parameters until a fix is applied. 4. Implement network segmentation to isolate vulnerable devices from critical infrastructure. 5. Employ network intrusion detection systems (NIDS) to monitor for unusual traffic patterns that may indicate exploitation attempts. 6. Consider replacing affected devices with models from vendors with a stronger security track record if timely patching is not feasible. 7. Maintain regular backups of router configurations to facilitate rapid recovery in case of device failure due to exploitation.
Affected Countries
China, India, Russia, Indonesia, Vietnam, Thailand, Brazil, South Africa, Poland, Ukraine
CVE-2024-30586: n/a
Description
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the security_5g parameter of the formWifiBasicSet function.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-30586 identifies a stack overflow vulnerability in the Tenda FH1202 router firmware version 1.2.0.14(408). The flaw resides in the handling of the security_5g parameter within the formWifiBasicSet function. Specifically, improper bounds checking or input validation allows crafted input to overflow the stack, potentially overwriting control data and causing the device to crash or reboot unexpectedly. This vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). Exploitation requires an attacker to have adjacent network access (AV:A), but no privileges or user interaction are necessary. The impact is limited to availability (A:H), meaning the attacker can cause denial of service but cannot compromise confidentiality or integrity. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability affects a specific firmware version of the Tenda FH1202, a consumer-grade wireless router commonly used in home and small office environments. The medium CVSS score of 6.5 reflects the moderate risk posed by this vulnerability due to the limited attack vector and impact scope.
Potential Impact
The primary impact of CVE-2024-30586 is denial of service, which can disrupt network connectivity and availability for users relying on the Tenda FH1202 router. This can affect home users, small businesses, and potentially larger organizations if these devices are deployed in critical network segments. The inability to maintain stable wireless connectivity can lead to operational downtime, loss of productivity, and potential cascading effects if the router serves as a gateway or critical network node. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized access are unlikely through this flaw alone. However, denial of service in network infrastructure can indirectly impact business continuity and user experience. The lack of known exploits reduces immediate risk, but the absence of patches means the vulnerability remains exploitable if discovered by attackers.
Mitigation Recommendations
1. Restrict network access to the router's management interfaces, especially from untrusted or external networks, to limit exposure to adjacent attackers. 2. Monitor Tenda's official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 3. If possible, disable or restrict the use of the 5G wireless band or the affected configuration parameters until a fix is applied. 4. Implement network segmentation to isolate vulnerable devices from critical infrastructure. 5. Employ network intrusion detection systems (NIDS) to monitor for unusual traffic patterns that may indicate exploitation attempts. 6. Consider replacing affected devices with models from vendors with a stronger security track record if timely patching is not feasible. 7. Maintain regular backups of router configurations to facilitate rapid recovery in case of device failure due to exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6dc2b7ef31ef0b58dca5
Added to database: 2/25/2026, 9:46:42 PM
Last enriched: 2/26/2026, 12:11:31 PM
Last updated: 4/12/2026, 3:45:43 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.