CVE-2024-30631: n/a
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedStartTime parameter from setSchedWifi function.
AI Analysis
Technical Summary
CVE-2024-30631 identifies a stack overflow vulnerability in the Tenda FH1205 router firmware version 2.0.0.7(775). The vulnerability arises from improper handling of the schedStartTime parameter within the setSchedWifi function. This function likely manages scheduled Wi-Fi operations, and the stack overflow occurs when the input parameter exceeds expected bounds, overwriting adjacent memory on the stack. Such a flaw is categorized under CWE-121 (Stack-based Buffer Overflow), which can lead to corruption of the program’s control flow or data integrity. The vulnerability can be triggered remotely over the network (AV:N), requires low attack complexity (AC:L), and low privileges (PR:L), but does not require user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 score is 4.3, reflecting a medium severity primarily due to the impact on integrity without affecting confidentiality or availability. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The lack of patches means that affected devices remain vulnerable until firmware updates are provided by Tenda. This vulnerability could be exploited by an attacker with network access to the device’s management interface or possibly through other exposed services, potentially allowing them to cause unexpected behavior or denial of service by corrupting the device’s memory state.
Potential Impact
The primary impact of this vulnerability is on the integrity of the affected Tenda FH1205 routers. An attacker exploiting this stack overflow could manipulate the device’s operation, potentially causing it to behave unpredictably or crash. While confidentiality and availability are not directly impacted according to the CVSS vector, the integrity compromise could lead to indirect availability issues if the device becomes unstable or reboots unexpectedly. For organizations relying on these routers for network connectivity, this could disrupt internal communications or expose the network to further attacks if the device is compromised. Since the vulnerability requires low privileges but network access, attackers within the local network or with access to the device’s management interface are the most likely threat actors. The absence of known exploits reduces immediate risk, but the presence of a stack overflow vulnerability is a serious concern due to the potential for future exploit development. The impact is more significant in environments where these routers are widely deployed and where network segmentation or access controls are weak.
Mitigation Recommendations
To mitigate CVE-2024-30631, organizations should first restrict network access to the Tenda FH1205 router’s management interfaces, limiting it to trusted administrators only and preferably isolating it from untrusted networks. Implement strong authentication and change default credentials to prevent unauthorized access. Monitor network traffic for unusual activity targeting the router’s management functions. Since no official patches are currently available, users should regularly check Tenda’s official channels for firmware updates addressing this vulnerability and apply them promptly once released. As an interim measure, consider disabling scheduled Wi-Fi functions if possible, or avoid using the setSchedWifi feature until a patch is available. Network segmentation can help contain potential exploitation by limiting attacker movement. Additionally, deploying network intrusion detection systems (NIDS) that can identify anomalous packets or malformed inputs targeting the router may provide early warning of exploitation attempts. Finally, maintain an inventory of affected devices to prioritize remediation efforts.
Affected Countries
China, India, Russia, Vietnam, Indonesia, Brazil, Germany, United Kingdom, France, Italy
CVE-2024-30631: n/a
Description
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedStartTime parameter from setSchedWifi function.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-30631 identifies a stack overflow vulnerability in the Tenda FH1205 router firmware version 2.0.0.7(775). The vulnerability arises from improper handling of the schedStartTime parameter within the setSchedWifi function. This function likely manages scheduled Wi-Fi operations, and the stack overflow occurs when the input parameter exceeds expected bounds, overwriting adjacent memory on the stack. Such a flaw is categorized under CWE-121 (Stack-based Buffer Overflow), which can lead to corruption of the program’s control flow or data integrity. The vulnerability can be triggered remotely over the network (AV:N), requires low attack complexity (AC:L), and low privileges (PR:L), but does not require user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 score is 4.3, reflecting a medium severity primarily due to the impact on integrity without affecting confidentiality or availability. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The lack of patches means that affected devices remain vulnerable until firmware updates are provided by Tenda. This vulnerability could be exploited by an attacker with network access to the device’s management interface or possibly through other exposed services, potentially allowing them to cause unexpected behavior or denial of service by corrupting the device’s memory state.
Potential Impact
The primary impact of this vulnerability is on the integrity of the affected Tenda FH1205 routers. An attacker exploiting this stack overflow could manipulate the device’s operation, potentially causing it to behave unpredictably or crash. While confidentiality and availability are not directly impacted according to the CVSS vector, the integrity compromise could lead to indirect availability issues if the device becomes unstable or reboots unexpectedly. For organizations relying on these routers for network connectivity, this could disrupt internal communications or expose the network to further attacks if the device is compromised. Since the vulnerability requires low privileges but network access, attackers within the local network or with access to the device’s management interface are the most likely threat actors. The absence of known exploits reduces immediate risk, but the presence of a stack overflow vulnerability is a serious concern due to the potential for future exploit development. The impact is more significant in environments where these routers are widely deployed and where network segmentation or access controls are weak.
Mitigation Recommendations
To mitigate CVE-2024-30631, organizations should first restrict network access to the Tenda FH1205 router’s management interfaces, limiting it to trusted administrators only and preferably isolating it from untrusted networks. Implement strong authentication and change default credentials to prevent unauthorized access. Monitor network traffic for unusual activity targeting the router’s management functions. Since no official patches are currently available, users should regularly check Tenda’s official channels for firmware updates addressing this vulnerability and apply them promptly once released. As an interim measure, consider disabling scheduled Wi-Fi functions if possible, or avoid using the setSchedWifi feature until a patch is available. Network segmentation can help contain potential exploitation by limiting attacker movement. Additionally, deploying network intrusion detection systems (NIDS) that can identify anomalous packets or malformed inputs targeting the router may provide early warning of exploitation attempts. Finally, maintain an inventory of affected devices to prioritize remediation efforts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6dc5b7ef31ef0b58ded1
Added to database: 2/25/2026, 9:46:45 PM
Last enriched: 2/26/2026, 5:44:45 PM
Last updated: 4/12/2026, 3:45:10 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.