Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30586: n/a

0
Medium
VulnerabilityCVE-2024-30586cvecve-2024-30586
Published: Thu Mar 28 2024 (03/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the security_5g parameter of the formWifiBasicSet function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 12:11:31 UTC

Technical Analysis

CVE-2024-30586 identifies a stack overflow vulnerability in the Tenda FH1202 router firmware version 1.2.0.14(408). The flaw resides in the handling of the security_5g parameter within the formWifiBasicSet function. Specifically, improper bounds checking or input validation allows crafted input to overflow the stack, potentially overwriting control data and causing the device to crash or reboot unexpectedly. This vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). Exploitation requires an attacker to have adjacent network access (AV:A), but no privileges or user interaction are necessary. The impact is limited to availability (A:H), meaning the attacker can cause denial of service but cannot compromise confidentiality or integrity. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability affects a specific firmware version of the Tenda FH1202, a consumer-grade wireless router commonly used in home and small office environments. The medium CVSS score of 6.5 reflects the moderate risk posed by this vulnerability due to the limited attack vector and impact scope.

Potential Impact

The primary impact of CVE-2024-30586 is denial of service, which can disrupt network connectivity and availability for users relying on the Tenda FH1202 router. This can affect home users, small businesses, and potentially larger organizations if these devices are deployed in critical network segments. The inability to maintain stable wireless connectivity can lead to operational downtime, loss of productivity, and potential cascading effects if the router serves as a gateway or critical network node. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized access are unlikely through this flaw alone. However, denial of service in network infrastructure can indirectly impact business continuity and user experience. The lack of known exploits reduces immediate risk, but the absence of patches means the vulnerability remains exploitable if discovered by attackers.

Mitigation Recommendations

1. Restrict network access to the router's management interfaces, especially from untrusted or external networks, to limit exposure to adjacent attackers. 2. Monitor Tenda's official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 3. If possible, disable or restrict the use of the 5G wireless band or the affected configuration parameters until a fix is applied. 4. Implement network segmentation to isolate vulnerable devices from critical infrastructure. 5. Employ network intrusion detection systems (NIDS) to monitor for unusual traffic patterns that may indicate exploitation attempts. 6. Consider replacing affected devices with models from vendors with a stronger security track record if timely patching is not feasible. 7. Maintain regular backups of router configurations to facilitate rapid recovery in case of device failure due to exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dc2b7ef31ef0b58dca5

Added to database: 2/25/2026, 9:46:42 PM

Last enriched: 2/26/2026, 12:11:31 PM

Last updated: 4/12/2026, 3:45:43 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses