Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41462: n/a

0
Medium
VulnerabilityCVE-2024-41462cvecve-2024-41462
Published: Wed Jul 24 2024 (07/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the page parameter at ip/goform/DhcpListClient.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:43:04 UTC

Technical Analysis

CVE-2024-41462 identifies a stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1.2.0.14. The vulnerability arises from improper bounds checking of the 'page' parameter in the HTTP request to the ip/goform/DhcpListClient endpoint. An attacker can send a crafted request with a specially crafted 'page' parameter to overflow the stack buffer, potentially causing the router to crash or reboot, resulting in denial of service (DoS). The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. However, the impact is limited to availability disruption without compromising confidentiality or integrity of data. The CVSS v3.1 base score is 4.3, reflecting low impact on confidentiality and integrity but some impact on availability. No public exploits or patches are currently available, and the vulnerability is categorized under CWE-121, which involves stack-based buffer overflows due to improper input validation. Given the nature of embedded router firmware, exploitation could lead to temporary network outages but is unlikely to enable code execution or persistent compromise.

Potential Impact

The primary impact of CVE-2024-41462 is denial of service through router crashes or reboots, which can disrupt network connectivity for affected organizations. This can affect both home users and small to medium enterprises relying on Tenda FH1201 routers for internet access. Although the vulnerability does not expose sensitive data or allow unauthorized access, the loss of availability can interrupt business operations, VoIP communications, and other critical services dependent on continuous network uptime. In environments where these routers serve as the primary gateway, repeated exploitation could lead to significant operational disruption. However, the lack of known exploits and the medium severity score suggest a moderate risk level. Organizations with large deployments of Tenda devices or those in critical infrastructure sectors should be particularly cautious.

Mitigation Recommendations

Since no official patches are currently available, organizations should implement the following mitigations: 1) Restrict remote access to the router’s management interface by limiting it to trusted IP addresses or disabling remote management if not needed. 2) Employ network segmentation to isolate vulnerable routers from critical internal networks, reducing the impact of potential DoS. 3) Monitor network traffic for unusual HTTP requests targeting the ip/goform/DhcpListClient endpoint, which could indicate exploitation attempts. 4) Regularly check for firmware updates from Tenda and apply patches promptly once released. 5) Consider replacing affected routers with models from vendors with a stronger security track record if long-term mitigation is required. 6) Use intrusion detection/prevention systems (IDS/IPS) to detect and block malformed packets targeting this vulnerability. These steps go beyond generic advice by focusing on access control, monitoring, and network architecture adjustments tailored to this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cb9b7ef31ef0b568727

Added to database: 2/25/2026, 9:42:17 PM

Last enriched: 2/28/2026, 5:43:04 AM

Last updated: 4/11/2026, 6:43:09 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses