Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30589: n/a

0
Critical
VulnerabilityCVE-2024-30589cvecve-2024-30589
Published: Thu Mar 28 2024 (03/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability in the entrys parameter of the fromAddressNat function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 14:26:49 UTC

Technical Analysis

CVE-2024-30589 identifies a critical stack overflow vulnerability in the Tenda FH1202 router firmware version 1.2.0.14(408). The flaw exists in the fromAddressNat function, specifically in the handling of the 'entrys' parameter, which is improperly validated, leading to a stack-based buffer overflow (CWE-121). This vulnerability can be triggered remotely over the network without requiring any authentication or user interaction, making it highly exploitable. Successful exploitation allows an attacker to execute arbitrary code with the privileges of the affected process, potentially leading to full control over the router. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's critical impact on confidentiality, integrity, and availability. The vulnerability was published on March 28, 2024, and no patches or official fixes have been released yet. No known exploits have been observed in the wild, but the ease of exploitation and critical severity suggest that attackers may develop exploits soon. The affected device, Tenda FH1202, is a consumer-grade router commonly used in home and small office environments, which could serve as a foothold for attackers to infiltrate internal networks or launch further attacks. The lack of authentication and user interaction requirements significantly increases the risk profile. The vulnerability highlights the importance of secure coding practices in embedded device firmware, especially for network-facing functions.

Potential Impact

The impact of CVE-2024-30589 is severe for organizations and individuals using the Tenda FH1202 router. Exploitation can lead to complete compromise of the device, allowing attackers to intercept, modify, or redirect network traffic, potentially leading to data breaches, espionage, or disruption of services. The router could be used as a pivot point to launch attacks against internal networks, compromising other connected systems. The loss of confidentiality, integrity, and availability of network communications can have cascading effects on business operations, especially for small offices relying on these devices for connectivity and security. The vulnerability's remote, unauthenticated exploitability means attackers can scan and target vulnerable devices en masse, increasing the likelihood of widespread attacks once exploits become available. The absence of patches further exacerbates the risk, leaving users exposed. Additionally, compromised routers can be conscripted into botnets for large-scale distributed denial-of-service (DDoS) attacks, affecting broader internet infrastructure.

Mitigation Recommendations

Since no official patches are currently available, organizations should implement immediate compensating controls. First, disable remote management interfaces on the Tenda FH1202 routers to reduce exposure to external attackers. Segment the network to isolate vulnerable devices from critical assets and restrict inbound and outbound traffic to only necessary communications. Employ network intrusion detection systems (NIDS) to monitor for unusual traffic patterns or exploitation attempts targeting the 'entrys' parameter or related functions. Regularly audit and update router firmware when patches become available from the vendor. Consider replacing affected devices with models from vendors with a stronger security track record if patching is delayed. Educate users about the risks of using default credentials and ensure strong, unique passwords are set on all network devices. Finally, maintain up-to-date asset inventories to quickly identify and remediate vulnerable devices in the environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dc2b7ef31ef0b58dcf2

Added to database: 2/25/2026, 9:46:42 PM

Last enriched: 2/26/2026, 2:26:49 PM

Last updated: 4/11/2026, 8:45:49 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses