Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32302: n/a

0
Medium
VulnerabilityCVE-2024-32302cvecve-2024-32302
Published: Wed Apr 17 2024 (04/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-32302 is a medium severity stack overflow vulnerability found in the Tenda FH1202 router firmware version 1. 2. 0. 14(408). The flaw exists in the fromWizardHandle function via the PPW parameter, allowing an attacker with local privileges to potentially cause a denial of service or execute arbitrary code. Exploitation requires network access and low privileges but no user interaction. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability impacts confidentiality, integrity, and availability but with limited scope due to required privileges. Organizations using Tenda FH1202 routers should monitor for firmware updates and restrict access to management interfaces. Countries with significant deployments of Tenda networking equipment and critical infrastructure relying on these devices are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:16:19 UTC

Technical Analysis

CVE-2024-32302 identifies a stack-based buffer overflow vulnerability in the Tenda FH1202 router firmware version 1.2.0.14(408). The vulnerability arises from improper handling of the PPW parameter within the fromWizardHandle function, which does not adequately validate input size or bounds, leading to a stack overflow condition (CWE-121). This flaw can be exploited remotely over the network (AV:N) with low attack complexity (AC:L) but requires low-level privileges (PR:L) and no user interaction (UI:N). The vulnerability affects the confidentiality, integrity, and availability of the device, potentially allowing an attacker to execute arbitrary code or cause a denial of service by crashing the device. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 6.3, indicating medium severity. No public exploit code or patches are currently available, but the vulnerability poses a risk to networks using this router model, especially if exposed to untrusted networks or if administrative access controls are weak. The lack of patches necessitates proactive mitigation until official fixes are released.

Potential Impact

The vulnerability could allow an attacker with network access and low privileges to exploit the stack overflow to disrupt router operations or execute arbitrary code, potentially leading to denial of service or unauthorized control over the device. This can compromise the confidentiality and integrity of network traffic passing through the router and affect the availability of network services. Organizations relying on Tenda FH1202 routers for critical network infrastructure may experience service outages or data breaches. The impact is particularly significant in environments where these routers are exposed to untrusted networks or where administrative interfaces are insufficiently protected. Although no known exploits exist in the wild, the vulnerability could be targeted by attackers seeking to pivot into internal networks or disrupt operations.

Mitigation Recommendations

1. Immediately restrict network access to the router’s management interfaces, limiting it to trusted IP addresses or internal networks only. 2. Disable any unnecessary services or remote management features on the Tenda FH1202 device to reduce the attack surface. 3. Monitor network traffic and device logs for unusual activity that may indicate exploitation attempts. 4. Implement network segmentation to isolate vulnerable devices from critical infrastructure. 5. Regularly check for firmware updates from Tenda and apply patches promptly once available. 6. Consider replacing affected devices with models from vendors with a stronger security track record if patches are delayed. 7. Employ intrusion detection/prevention systems (IDS/IPS) to detect anomalous packets targeting the PPW parameter or related functions. 8. Educate network administrators about the vulnerability and enforce strong authentication and access control policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c33b7ef31ef0b56115e

Added to database: 2/25/2026, 9:40:03 PM

Last enriched: 2/26/2026, 4:16:19 AM

Last updated: 2/26/2026, 12:42:43 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats