CVE-2024-30589: n/a
Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability in the entrys parameter of the fromAddressNat function.
AI Analysis
Technical Summary
CVE-2024-30589 identifies a critical stack overflow vulnerability in the Tenda FH1202 router firmware version 1.2.0.14(408). The flaw exists in the fromAddressNat function, specifically in the handling of the 'entrys' parameter, which is improperly validated, leading to a stack-based buffer overflow (CWE-121). This vulnerability can be triggered remotely over the network without requiring any authentication or user interaction, making it highly exploitable. Successful exploitation allows an attacker to execute arbitrary code with the privileges of the affected process, potentially leading to full control over the router. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's critical impact on confidentiality, integrity, and availability. The vulnerability was published on March 28, 2024, and no patches or official fixes have been released yet. No known exploits have been observed in the wild, but the ease of exploitation and critical severity suggest that attackers may develop exploits soon. The affected device, Tenda FH1202, is a consumer-grade router commonly used in home and small office environments, which could serve as a foothold for attackers to infiltrate internal networks or launch further attacks. The lack of authentication and user interaction requirements significantly increases the risk profile. The vulnerability highlights the importance of secure coding practices in embedded device firmware, especially for network-facing functions.
Potential Impact
The impact of CVE-2024-30589 is severe for organizations and individuals using the Tenda FH1202 router. Exploitation can lead to complete compromise of the device, allowing attackers to intercept, modify, or redirect network traffic, potentially leading to data breaches, espionage, or disruption of services. The router could be used as a pivot point to launch attacks against internal networks, compromising other connected systems. The loss of confidentiality, integrity, and availability of network communications can have cascading effects on business operations, especially for small offices relying on these devices for connectivity and security. The vulnerability's remote, unauthenticated exploitability means attackers can scan and target vulnerable devices en masse, increasing the likelihood of widespread attacks once exploits become available. The absence of patches further exacerbates the risk, leaving users exposed. Additionally, compromised routers can be conscripted into botnets for large-scale distributed denial-of-service (DDoS) attacks, affecting broader internet infrastructure.
Mitigation Recommendations
Since no official patches are currently available, organizations should implement immediate compensating controls. First, disable remote management interfaces on the Tenda FH1202 routers to reduce exposure to external attackers. Segment the network to isolate vulnerable devices from critical assets and restrict inbound and outbound traffic to only necessary communications. Employ network intrusion detection systems (NIDS) to monitor for unusual traffic patterns or exploitation attempts targeting the 'entrys' parameter or related functions. Regularly audit and update router firmware when patches become available from the vendor. Consider replacing affected devices with models from vendors with a stronger security track record if patching is delayed. Educate users about the risks of using default credentials and ensure strong, unique passwords are set on all network devices. Finally, maintain up-to-date asset inventories to quickly identify and remediate vulnerable devices in the environment.
Affected Countries
China, India, Indonesia, Vietnam, Thailand, Malaysia, Philippines, Russia, Brazil, South Africa
CVE-2024-30589: n/a
Description
Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability in the entrys parameter of the fromAddressNat function.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-30589 identifies a critical stack overflow vulnerability in the Tenda FH1202 router firmware version 1.2.0.14(408). The flaw exists in the fromAddressNat function, specifically in the handling of the 'entrys' parameter, which is improperly validated, leading to a stack-based buffer overflow (CWE-121). This vulnerability can be triggered remotely over the network without requiring any authentication or user interaction, making it highly exploitable. Successful exploitation allows an attacker to execute arbitrary code with the privileges of the affected process, potentially leading to full control over the router. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's critical impact on confidentiality, integrity, and availability. The vulnerability was published on March 28, 2024, and no patches or official fixes have been released yet. No known exploits have been observed in the wild, but the ease of exploitation and critical severity suggest that attackers may develop exploits soon. The affected device, Tenda FH1202, is a consumer-grade router commonly used in home and small office environments, which could serve as a foothold for attackers to infiltrate internal networks or launch further attacks. The lack of authentication and user interaction requirements significantly increases the risk profile. The vulnerability highlights the importance of secure coding practices in embedded device firmware, especially for network-facing functions.
Potential Impact
The impact of CVE-2024-30589 is severe for organizations and individuals using the Tenda FH1202 router. Exploitation can lead to complete compromise of the device, allowing attackers to intercept, modify, or redirect network traffic, potentially leading to data breaches, espionage, or disruption of services. The router could be used as a pivot point to launch attacks against internal networks, compromising other connected systems. The loss of confidentiality, integrity, and availability of network communications can have cascading effects on business operations, especially for small offices relying on these devices for connectivity and security. The vulnerability's remote, unauthenticated exploitability means attackers can scan and target vulnerable devices en masse, increasing the likelihood of widespread attacks once exploits become available. The absence of patches further exacerbates the risk, leaving users exposed. Additionally, compromised routers can be conscripted into botnets for large-scale distributed denial-of-service (DDoS) attacks, affecting broader internet infrastructure.
Mitigation Recommendations
Since no official patches are currently available, organizations should implement immediate compensating controls. First, disable remote management interfaces on the Tenda FH1202 routers to reduce exposure to external attackers. Segment the network to isolate vulnerable devices from critical assets and restrict inbound and outbound traffic to only necessary communications. Employ network intrusion detection systems (NIDS) to monitor for unusual traffic patterns or exploitation attempts targeting the 'entrys' parameter or related functions. Regularly audit and update router firmware when patches become available from the vendor. Consider replacing affected devices with models from vendors with a stronger security track record if patching is delayed. Educate users about the risks of using default credentials and ensure strong, unique passwords are set on all network devices. Finally, maintain up-to-date asset inventories to quickly identify and remediate vulnerable devices in the environment.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6dc2b7ef31ef0b58dcf2
Added to database: 2/25/2026, 9:46:42 PM
Last enriched: 2/26/2026, 2:26:49 PM
Last updated: 4/11/2026, 8:45:49 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.