Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30626: n/a

0
High
VulnerabilityCVE-2024-30626cvecve-2024-30626
Published: Fri Mar 29 2024 (03/29/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedEndTime parameter from setSchedWifi function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 12:14:06 UTC

Technical Analysis

CVE-2024-30626 identifies a stack overflow vulnerability in the Tenda FH1205 router firmware version 2.0.0.7(775). The vulnerability arises from improper handling of the schedEndTime parameter within the setSchedWifi function. This parameter, when crafted maliciously, causes a stack buffer overflow (CWE-121), which can overwrite the stack memory and potentially allow an attacker to execute arbitrary code or cause a denial of service. The vulnerability requires an attacker to have local network access with low privileges (PR:L), does not require user interaction (UI:N), and has low attack complexity (AC:L). The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via VPN. The vulnerability impacts confidentiality, integrity, and availability (all rated high), indicating that successful exploitation could lead to full device compromise. No patches or known exploits are currently available, but the high CVSS score of 8.0 reflects the severity and potential impact. The flaw is particularly critical because routers are often a gateway device, and compromise can lead to broader network infiltration. The lack of user interaction and low complexity make this a viable target for attackers with network access. The vulnerability was published on March 29, 2024, with no specific affected versions beyond the noted firmware version. The absence of patch links suggests that vendors have yet to release a fix, increasing the urgency for mitigation.

Potential Impact

The impact of CVE-2024-30626 is significant for organizations using Tenda FH1205 routers. Exploitation could allow attackers to execute arbitrary code on the device, leading to full compromise of the router. This includes interception or manipulation of network traffic, disruption of network services, and potential pivoting to internal network systems. Confidentiality is at risk as attackers could eavesdrop on sensitive communications. Integrity is compromised as attackers might alter router configurations or inject malicious payloads. Availability is threatened through denial-of-service conditions caused by the stack overflow. Given that routers serve as critical network infrastructure, their compromise can have cascading effects on organizational security posture. The requirement for local network access limits remote exploitation but does not eliminate risk, especially in environments with weak network segmentation or exposed Wi-Fi networks. The absence of known exploits in the wild currently reduces immediate threat but does not preclude future exploitation. Organizations globally relying on this router model face potential operational disruptions and data breaches if this vulnerability is exploited.

Mitigation Recommendations

1. Network Segmentation: Isolate Tenda FH1205 routers from untrusted networks and restrict access to management interfaces to trusted administrators only. 2. Access Control: Enforce strong authentication and limit network access to the router’s configuration services. 3. Monitoring: Implement network monitoring to detect unusual traffic patterns or attempts to exploit the schedEndTime parameter. 4. Firmware Updates: Regularly check for firmware updates from Tenda and apply patches promptly once available. 5. Disable Unnecessary Services: Turn off any unused features or services on the router to reduce attack surface. 6. Incident Response: Prepare to isolate affected devices quickly if exploitation is suspected. 7. Vendor Engagement: Engage with Tenda support channels to obtain information on patch timelines or workarounds. 8. Network Access Controls: Use VLANs and firewall rules to limit local network access to the router’s management interface. These steps go beyond generic advice by focusing on network architecture and proactive monitoring to mitigate exploitation risk until a patch is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dc4b7ef31ef0b58de83

Added to database: 2/25/2026, 9:46:44 PM

Last enriched: 2/26/2026, 12:14:06 PM

Last updated: 4/12/2026, 3:47:08 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses