Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33211: n/a

0
High
VulnerabilityCVE-2024-33211cvecve-2024-33211
Published: Tue Apr 23 2024 (04/23/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33211 is a high-severity stack-based buffer overflow vulnerability found in the Tenda FH1206 router firmware version 1. 2. 0. 8(8155)_EN. The flaw exists in the handling of the PPPOEPassword parameter within the ip/goform/QuickIndex endpoint, allowing remote attackers to execute arbitrary code or cause denial of service without authentication or user interaction. The vulnerability has a CVSS score of 7. 3, reflecting its network exploitable nature with low attack complexity and no privileges required. Although no known exploits are currently reported in the wild, successful exploitation could compromise confidentiality, integrity, and availability of affected devices. Organizations using this router model are at risk of remote compromise, potentially impacting network security and stability. Mitigation requires firmware updates from the vendor or network-level protections such as filtering access to the vulnerable endpoint.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:24:19 UTC

Technical Analysis

CVE-2024-33211 is a stack-based buffer overflow vulnerability identified in the Tenda FH1206 router firmware version 1.2.0.8(8155)_EN. The vulnerability arises from improper bounds checking on the PPPOEPassword parameter processed by the ip/goform/QuickIndex endpoint. An attacker can send a specially crafted HTTP request to this endpoint, triggering a buffer overflow on the stack. This condition can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, making it particularly dangerous. The CVSS v3.1 base score is 7.3, indicating high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The weakness corresponds to CWE-121 (Stack-based Buffer Overflow), a common and critical software flaw that can lead to serious security breaches. No patches or firmware updates have been publicly released yet, and no exploits have been observed in the wild. However, the potential for exploitation exists, especially if attackers develop proof-of-concept code. The affected device, Tenda FH1206, is a consumer-grade router widely used in various regions, particularly in Asia and emerging markets. This vulnerability could allow attackers to gain control over the device, intercept or manipulate network traffic, or disrupt network availability.

Potential Impact

The impact of CVE-2024-33211 is significant for organizations and individuals using the Tenda FH1206 router. Successful exploitation can lead to remote code execution, allowing attackers to take full control of the device. This compromises the confidentiality and integrity of network communications passing through the router, potentially exposing sensitive data or enabling man-in-the-middle attacks. Additionally, attackers could disrupt network availability by causing device crashes or reboots, leading to denial of service. For organizations relying on these routers for internet connectivity or internal network segmentation, this vulnerability could serve as a foothold for further lateral movement or persistent access. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the risk of automated attacks or wormable malware targeting vulnerable devices. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a critical risk until mitigated.

Mitigation Recommendations

To mitigate CVE-2024-33211, affected users and organizations should monitor Tenda's official channels for firmware updates addressing this vulnerability and apply them promptly once available. In the absence of an official patch, network administrators should restrict access to the router's management interfaces, especially the ip/goform/QuickIndex endpoint, by implementing firewall rules or access control lists to block unauthorized external traffic. Disabling remote management features or restricting management access to trusted internal networks can reduce exposure. Network intrusion detection systems (IDS) and intrusion prevention systems (IPS) should be configured to detect and block suspicious requests targeting the PPPOEPassword parameter. Regularly auditing router configurations and monitoring network traffic for anomalies can help identify exploitation attempts. Organizations should consider segmenting vulnerable devices from critical infrastructure to limit potential damage. Finally, educating users about the risks and encouraging replacement of unsupported or unpatchable devices can enhance long-term security posture.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c3bb7ef31ef0b5615fa

Added to database: 2/25/2026, 9:40:11 PM

Last enriched: 2/26/2026, 4:24:19 AM

Last updated: 2/26/2026, 11:07:08 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats