Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32299: n/a

0
High
VulnerabilityCVE-2024-32299cvecve-2024-32299
Published: Wed Apr 17 2024 (04/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-32299 is a high-severity stack overflow vulnerability in the Tenda FH1203 router firmware version 2. 0. 1. 6. It arises from improper handling of the PPW parameter in the fromWizardHandle function, allowing an attacker with local privileges to execute arbitrary code. The vulnerability has a CVSS score of 8. 8, indicating critical impacts on confidentiality, integrity, and availability without requiring user interaction. Exploitation requires at least low privileges but can lead to full system compromise. No public exploits or patches are currently available. Organizations using this router model are at risk of remote code execution attacks, potentially leading to network compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:15:59 UTC

Technical Analysis

CVE-2024-32299 identifies a stack overflow vulnerability in the Tenda FH1203 router firmware version 2.0.1.6. The flaw exists in the fromWizardHandle function, specifically triggered by the PPW parameter, which is improperly validated, allowing an attacker to overflow the stack. This type of vulnerability (CWE-121) can lead to arbitrary code execution, enabling attackers to execute malicious payloads with the privileges of the affected process. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high severity due to network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability's characteristics suggest it could be weaponized for remote code execution or denial of service attacks. The affected device is a consumer-grade router widely used in residential and small business environments, making it a potential target for attackers seeking to compromise home or small office networks. The lack of available patches or mitigations at the time of disclosure increases the urgency for defensive measures. The vulnerability's exploitation could allow attackers to gain control over network traffic, intercept sensitive data, or disrupt network services.

Potential Impact

The impact of CVE-2024-32299 is significant for organizations and individuals using the Tenda FH1203 router. Successful exploitation can lead to full compromise of the router, allowing attackers to execute arbitrary code, manipulate network traffic, and potentially pivot to internal networks. This threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized changes to router configurations, and availability by enabling denial of service conditions. For enterprises relying on these devices for network connectivity, this could result in operational disruptions and data breaches. The vulnerability's low attack complexity and lack of user interaction make it attractive for automated exploitation campaigns. Additionally, compromised routers can be leveraged as part of botnets or for launching further attacks, amplifying the threat landscape. The absence of patches increases the window of exposure, emphasizing the need for immediate mitigation.

Mitigation Recommendations

To mitigate CVE-2024-32299, organizations should first restrict access to the router's management interfaces, ensuring they are not exposed to untrusted networks or the internet. Implement strong authentication mechanisms and change default credentials to prevent unauthorized access. Network segmentation can limit the impact of a compromised device. Monitoring network traffic for unusual patterns or signs of exploitation attempts is critical. Since no official patches are currently available, users should regularly check Tenda's official channels for firmware updates addressing this vulnerability. If possible, consider replacing affected devices with models from vendors with more robust security track records. Employing intrusion detection/prevention systems (IDS/IPS) that can detect exploitation attempts targeting known stack overflow patterns may also reduce risk. Finally, educating users about the risks and signs of router compromise can aid early detection and response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c33b7ef31ef0b561158

Added to database: 2/25/2026, 9:40:03 PM

Last enriched: 2/26/2026, 4:15:59 AM

Last updated: 2/26/2026, 6:12:29 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats