Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30598: n/a

0
Medium
VulnerabilityCVE-2024-30598cvecve-2024-30598
Published: Thu Mar 28 2024 (03/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability in the security_5g parameter of the formWifiBasicSet function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:45:42 UTC

Technical Analysis

CVE-2024-30598 identifies a stack overflow vulnerability in the Tenda FH1203 router firmware version 2.0.1.6. The flaw exists in the formWifiBasicSet function, which processes the security_5g parameter. A stack overflow occurs when this parameter is improperly handled, potentially allowing an attacker to overwrite the stack memory. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). Exploitation requires the attacker to have adjacent network access (AV:A), but no privileges or user interaction are needed. The impact is limited to availability (denial of service) as the vulnerability does not compromise confidentiality or integrity. The CVSS 3.1 vector is AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating low attack complexity and no authentication required. No public exploits or patches are currently available, highlighting the importance of proactive mitigation. This vulnerability could be triggered remotely by sending crafted requests to the vulnerable function, causing the router to crash or reboot, disrupting network connectivity for users relying on this device.

Potential Impact

The primary impact of this vulnerability is a denial of service condition affecting the availability of the Tenda FH1203 router. Organizations relying on this device for network connectivity could experience intermittent or prolonged outages, impacting business operations, especially in environments where network uptime is critical. Although the vulnerability does not allow data theft or modification, the loss of network availability can disrupt communications, remote work, and access to cloud services. In large-scale deployments, such as in small to medium enterprises or residential ISPs using this router, exploitation could lead to widespread service interruptions. The lack of authentication and user interaction requirements lowers the barrier for attackers with network proximity, increasing the risk in shared or public network environments.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following specific measures: 1) Monitor Tenda’s official channels for firmware updates addressing CVE-2024-30598 and apply patches promptly once available. 2) Restrict access to the router’s management interfaces and vulnerable services to trusted networks only, using network segmentation and firewall rules to limit exposure. 3) Disable remote management features if not required, reducing the attack surface. 4) Employ network intrusion detection systems (NIDS) to monitor for anomalous traffic patterns targeting the formWifiBasicSet function or related parameters. 5) Consider replacing affected devices with models from vendors with more frequent security updates if patching is delayed. 6) Educate network administrators about the risks of adjacent network attacks and enforce strong network access controls to prevent unauthorized lateral movement.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dc2b7ef31ef0b58dd0a

Added to database: 2/25/2026, 9:46:42 PM

Last enriched: 2/26/2026, 5:45:42 PM

Last updated: 4/12/2026, 7:54:53 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses