CVE-2024-30626: n/a
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedEndTime parameter from setSchedWifi function.
AI Analysis
Technical Summary
CVE-2024-30626 identifies a stack overflow vulnerability in the Tenda FH1205 router firmware version 2.0.0.7(775). The vulnerability arises from improper handling of the schedEndTime parameter within the setSchedWifi function. This parameter, when crafted maliciously, causes a stack buffer overflow (CWE-121), which can overwrite the stack memory and potentially allow an attacker to execute arbitrary code or cause a denial of service. The vulnerability requires an attacker to have local network access with low privileges (PR:L), does not require user interaction (UI:N), and has low attack complexity (AC:L). The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via VPN. The vulnerability impacts confidentiality, integrity, and availability (all rated high), indicating that successful exploitation could lead to full device compromise. No patches or known exploits are currently available, but the high CVSS score of 8.0 reflects the severity and potential impact. The flaw is particularly critical because routers are often a gateway device, and compromise can lead to broader network infiltration. The lack of user interaction and low complexity make this a viable target for attackers with network access. The vulnerability was published on March 29, 2024, with no specific affected versions beyond the noted firmware version. The absence of patch links suggests that vendors have yet to release a fix, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-30626 is significant for organizations using Tenda FH1205 routers. Exploitation could allow attackers to execute arbitrary code on the device, leading to full compromise of the router. This includes interception or manipulation of network traffic, disruption of network services, and potential pivoting to internal network systems. Confidentiality is at risk as attackers could eavesdrop on sensitive communications. Integrity is compromised as attackers might alter router configurations or inject malicious payloads. Availability is threatened through denial-of-service conditions caused by the stack overflow. Given that routers serve as critical network infrastructure, their compromise can have cascading effects on organizational security posture. The requirement for local network access limits remote exploitation but does not eliminate risk, especially in environments with weak network segmentation or exposed Wi-Fi networks. The absence of known exploits in the wild currently reduces immediate threat but does not preclude future exploitation. Organizations globally relying on this router model face potential operational disruptions and data breaches if this vulnerability is exploited.
Mitigation Recommendations
1. Network Segmentation: Isolate Tenda FH1205 routers from untrusted networks and restrict access to management interfaces to trusted administrators only. 2. Access Control: Enforce strong authentication and limit network access to the router’s configuration services. 3. Monitoring: Implement network monitoring to detect unusual traffic patterns or attempts to exploit the schedEndTime parameter. 4. Firmware Updates: Regularly check for firmware updates from Tenda and apply patches promptly once available. 5. Disable Unnecessary Services: Turn off any unused features or services on the router to reduce attack surface. 6. Incident Response: Prepare to isolate affected devices quickly if exploitation is suspected. 7. Vendor Engagement: Engage with Tenda support channels to obtain information on patch timelines or workarounds. 8. Network Access Controls: Use VLANs and firewall rules to limit local network access to the router’s management interface. These steps go beyond generic advice by focusing on network architecture and proactive monitoring to mitigate exploitation risk until a patch is released.
Affected Countries
China, India, Russia, Brazil, Indonesia, Vietnam, Thailand, South Africa, Mexico, Turkey
CVE-2024-30626: n/a
Description
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedEndTime parameter from setSchedWifi function.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-30626 identifies a stack overflow vulnerability in the Tenda FH1205 router firmware version 2.0.0.7(775). The vulnerability arises from improper handling of the schedEndTime parameter within the setSchedWifi function. This parameter, when crafted maliciously, causes a stack buffer overflow (CWE-121), which can overwrite the stack memory and potentially allow an attacker to execute arbitrary code or cause a denial of service. The vulnerability requires an attacker to have local network access with low privileges (PR:L), does not require user interaction (UI:N), and has low attack complexity (AC:L). The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via VPN. The vulnerability impacts confidentiality, integrity, and availability (all rated high), indicating that successful exploitation could lead to full device compromise. No patches or known exploits are currently available, but the high CVSS score of 8.0 reflects the severity and potential impact. The flaw is particularly critical because routers are often a gateway device, and compromise can lead to broader network infiltration. The lack of user interaction and low complexity make this a viable target for attackers with network access. The vulnerability was published on March 29, 2024, with no specific affected versions beyond the noted firmware version. The absence of patch links suggests that vendors have yet to release a fix, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-30626 is significant for organizations using Tenda FH1205 routers. Exploitation could allow attackers to execute arbitrary code on the device, leading to full compromise of the router. This includes interception or manipulation of network traffic, disruption of network services, and potential pivoting to internal network systems. Confidentiality is at risk as attackers could eavesdrop on sensitive communications. Integrity is compromised as attackers might alter router configurations or inject malicious payloads. Availability is threatened through denial-of-service conditions caused by the stack overflow. Given that routers serve as critical network infrastructure, their compromise can have cascading effects on organizational security posture. The requirement for local network access limits remote exploitation but does not eliminate risk, especially in environments with weak network segmentation or exposed Wi-Fi networks. The absence of known exploits in the wild currently reduces immediate threat but does not preclude future exploitation. Organizations globally relying on this router model face potential operational disruptions and data breaches if this vulnerability is exploited.
Mitigation Recommendations
1. Network Segmentation: Isolate Tenda FH1205 routers from untrusted networks and restrict access to management interfaces to trusted administrators only. 2. Access Control: Enforce strong authentication and limit network access to the router’s configuration services. 3. Monitoring: Implement network monitoring to detect unusual traffic patterns or attempts to exploit the schedEndTime parameter. 4. Firmware Updates: Regularly check for firmware updates from Tenda and apply patches promptly once available. 5. Disable Unnecessary Services: Turn off any unused features or services on the router to reduce attack surface. 6. Incident Response: Prepare to isolate affected devices quickly if exploitation is suspected. 7. Vendor Engagement: Engage with Tenda support channels to obtain information on patch timelines or workarounds. 8. Network Access Controls: Use VLANs and firewall rules to limit local network access to the router’s management interface. These steps go beyond generic advice by focusing on network architecture and proactive monitoring to mitigate exploitation risk until a patch is released.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6dc4b7ef31ef0b58de83
Added to database: 2/25/2026, 9:46:44 PM
Last enriched: 2/26/2026, 12:14:06 PM
Last updated: 4/12/2026, 3:47:08 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.