Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41461: n/a

0
Critical
VulnerabilityCVE-2024-41461cvecve-2024-41461
Published: Wed Jul 24 2024 (07/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the list1 parameter at ip/goform/DhcpListClient.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:42:44 UTC

Technical Analysis

CVE-2024-41461 is a stack-based buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14. The vulnerability arises from improper bounds checking on the 'list1' parameter within the ip/goform/DhcpListClient endpoint. This flaw allows an unauthenticated remote attacker to send specially crafted requests that overflow the stack buffer, potentially leading to arbitrary code execution. The vulnerability is classified under CWE-787 (Out-of-bounds Write) and has a CVSS 3.1 base score of 9.8, indicating critical severity. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making exploitation straightforward. Successful exploitation compromises confidentiality, integrity, and availability of the device, enabling attackers to take full control, disrupt network operations, or pivot to internal networks. There are currently no patches or official mitigations released by the vendor, and no known exploits have been detected in the wild. The vulnerability affects the firmware version 1.2.0.14, but the exact range of affected versions is unspecified. Given the critical nature and the common use of Tenda routers in various regions, this vulnerability poses a significant risk to network security.

Potential Impact

The impact of CVE-2024-41461 is severe for organizations using the Tenda FH1201 router, particularly those exposing the device's management interface to untrusted networks. Exploitation can lead to full device compromise, allowing attackers to execute arbitrary code, disrupt network connectivity, intercept or manipulate traffic, and potentially launch further attacks within the internal network. This can result in data breaches, service outages, and loss of control over critical network infrastructure. The vulnerability's ease of exploitation and lack of required authentication increase the likelihood of automated attacks once exploit code becomes available. Organizations relying on this router model in enterprise, SMB, or ISP environments face heightened risk, especially if devices are deployed in perimeter or sensitive network segments. The absence of patches exacerbates the threat, making mitigation and detection critical to prevent exploitation.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls. First, restrict access to the router's management interface by limiting it to trusted internal networks and disabling remote management if enabled. Employ network segmentation and firewall rules to block unauthorized traffic to the ip/goform/DhcpListClient endpoint. Monitor network traffic for anomalous requests targeting the 'list1' parameter or unusual HTTP POST activity to the vulnerable endpoint. Consider deploying intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts. Where possible, replace or upgrade affected devices to models or firmware versions not impacted by this vulnerability once available. Regularly check vendor advisories for patches or updates. Additionally, conduct internal audits to identify all Tenda FH1201 devices and assess exposure. Educate network administrators about the vulnerability and signs of compromise to enhance detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cb9b7ef31ef0b568724

Added to database: 2/25/2026, 9:42:17 PM

Last enriched: 2/28/2026, 5:42:44 AM

Last updated: 4/12/2026, 1:58:57 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses