CVE-2024-41461: n/a
Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the list1 parameter at ip/goform/DhcpListClient.
AI Analysis
Technical Summary
CVE-2024-41461 is a stack-based buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14. The vulnerability arises from improper bounds checking on the 'list1' parameter within the ip/goform/DhcpListClient endpoint. This flaw allows an unauthenticated remote attacker to send specially crafted requests that overflow the stack buffer, potentially leading to arbitrary code execution. The vulnerability is classified under CWE-787 (Out-of-bounds Write) and has a CVSS 3.1 base score of 9.8, indicating critical severity. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making exploitation straightforward. Successful exploitation compromises confidentiality, integrity, and availability of the device, enabling attackers to take full control, disrupt network operations, or pivot to internal networks. There are currently no patches or official mitigations released by the vendor, and no known exploits have been detected in the wild. The vulnerability affects the firmware version 1.2.0.14, but the exact range of affected versions is unspecified. Given the critical nature and the common use of Tenda routers in various regions, this vulnerability poses a significant risk to network security.
Potential Impact
The impact of CVE-2024-41461 is severe for organizations using the Tenda FH1201 router, particularly those exposing the device's management interface to untrusted networks. Exploitation can lead to full device compromise, allowing attackers to execute arbitrary code, disrupt network connectivity, intercept or manipulate traffic, and potentially launch further attacks within the internal network. This can result in data breaches, service outages, and loss of control over critical network infrastructure. The vulnerability's ease of exploitation and lack of required authentication increase the likelihood of automated attacks once exploit code becomes available. Organizations relying on this router model in enterprise, SMB, or ISP environments face heightened risk, especially if devices are deployed in perimeter or sensitive network segments. The absence of patches exacerbates the threat, making mitigation and detection critical to prevent exploitation.
Mitigation Recommendations
Given the absence of official patches, organizations should implement immediate compensating controls. First, restrict access to the router's management interface by limiting it to trusted internal networks and disabling remote management if enabled. Employ network segmentation and firewall rules to block unauthorized traffic to the ip/goform/DhcpListClient endpoint. Monitor network traffic for anomalous requests targeting the 'list1' parameter or unusual HTTP POST activity to the vulnerable endpoint. Consider deploying intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts. Where possible, replace or upgrade affected devices to models or firmware versions not impacted by this vulnerability once available. Regularly check vendor advisories for patches or updates. Additionally, conduct internal audits to identify all Tenda FH1201 devices and assess exposure. Educate network administrators about the vulnerability and signs of compromise to enhance detection and response capabilities.
Affected Countries
China, India, Russia, Vietnam, Indonesia, Thailand, Brazil, United States, Germany, France
CVE-2024-41461: n/a
Description
Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the list1 parameter at ip/goform/DhcpListClient.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-41461 is a stack-based buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14. The vulnerability arises from improper bounds checking on the 'list1' parameter within the ip/goform/DhcpListClient endpoint. This flaw allows an unauthenticated remote attacker to send specially crafted requests that overflow the stack buffer, potentially leading to arbitrary code execution. The vulnerability is classified under CWE-787 (Out-of-bounds Write) and has a CVSS 3.1 base score of 9.8, indicating critical severity. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making exploitation straightforward. Successful exploitation compromises confidentiality, integrity, and availability of the device, enabling attackers to take full control, disrupt network operations, or pivot to internal networks. There are currently no patches or official mitigations released by the vendor, and no known exploits have been detected in the wild. The vulnerability affects the firmware version 1.2.0.14, but the exact range of affected versions is unspecified. Given the critical nature and the common use of Tenda routers in various regions, this vulnerability poses a significant risk to network security.
Potential Impact
The impact of CVE-2024-41461 is severe for organizations using the Tenda FH1201 router, particularly those exposing the device's management interface to untrusted networks. Exploitation can lead to full device compromise, allowing attackers to execute arbitrary code, disrupt network connectivity, intercept or manipulate traffic, and potentially launch further attacks within the internal network. This can result in data breaches, service outages, and loss of control over critical network infrastructure. The vulnerability's ease of exploitation and lack of required authentication increase the likelihood of automated attacks once exploit code becomes available. Organizations relying on this router model in enterprise, SMB, or ISP environments face heightened risk, especially if devices are deployed in perimeter or sensitive network segments. The absence of patches exacerbates the threat, making mitigation and detection critical to prevent exploitation.
Mitigation Recommendations
Given the absence of official patches, organizations should implement immediate compensating controls. First, restrict access to the router's management interface by limiting it to trusted internal networks and disabling remote management if enabled. Employ network segmentation and firewall rules to block unauthorized traffic to the ip/goform/DhcpListClient endpoint. Monitor network traffic for anomalous requests targeting the 'list1' parameter or unusual HTTP POST activity to the vulnerable endpoint. Consider deploying intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts. Where possible, replace or upgrade affected devices to models or firmware versions not impacted by this vulnerability once available. Regularly check vendor advisories for patches or updates. Additionally, conduct internal audits to identify all Tenda FH1201 devices and assess exposure. Educate network administrators about the vulnerability and signs of compromise to enhance detection and response capabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-07-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cb9b7ef31ef0b568724
Added to database: 2/25/2026, 9:42:17 PM
Last enriched: 2/28/2026, 5:42:44 AM
Last updated: 4/12/2026, 1:58:57 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.