Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41463: n/a

0
Medium
VulnerabilityCVE-2024-41463cvecve-2024-41463
Published: Wed Jul 24 2024 (07/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the entrys parameter at ip/goform/addressNat.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:43:17 UTC

Technical Analysis

CVE-2024-41463 identifies a stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1.2.0.14. The vulnerability arises from improper validation of the 'entrys' parameter in the ip/goform/addressNat endpoint, which is part of the router's web management interface. An attacker with network access and low privileges can send a specially crafted request to this endpoint, causing the router to overflow its stack buffer. This overflow can lead to a denial of service (DoS) condition by crashing or rebooting the device. The vulnerability does not allow for confidentiality or integrity breaches, as it does not enable code execution or data leakage. The CVSS v3.1 base score is 4.3, reflecting a medium severity level due to the network attack vector, low attack complexity, and requirement for privileges but no user interaction. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild. The vulnerability is classified under CWE-121, indicating a classic stack-based buffer overflow issue. This type of vulnerability is critical in embedded network devices because it can disrupt network availability and potentially be leveraged in chained attacks if combined with other vulnerabilities.

Potential Impact

The primary impact of CVE-2024-41463 is on the availability of affected Tenda FH1201 routers. Successful exploitation results in a denial of service by crashing or rebooting the device, which can disrupt network connectivity for users relying on these routers. This can affect home users, small businesses, and potentially larger organizations using this model in branch offices or remote sites. While the vulnerability does not compromise confidentiality or integrity, the loss of availability can interrupt business operations, degrade user experience, and increase operational costs due to downtime and troubleshooting. Additionally, repeated exploitation attempts could lead to persistent network instability. Since the vulnerability requires low privileges but no user interaction, attackers with limited access to the network could exploit it remotely, increasing the risk in environments where the device management interface is exposed or accessible internally. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation.

Mitigation Recommendations

Organizations should immediately audit their network environments to identify the presence of Tenda FH1201 routers running firmware version 1.2.0.14. Until an official patch is released, the following mitigations are recommended: 1) Restrict access to the router's management interface (ip/goform/addressNat endpoint) by implementing network segmentation and firewall rules to limit access only to trusted administrators. 2) Disable remote management features if not required, reducing exposure to external attackers. 3) Monitor network traffic for unusual or malformed requests targeting the vulnerable endpoint to detect potential exploitation attempts. 4) Regularly check Tenda's official channels for firmware updates or security advisories and apply patches promptly once available. 5) Consider replacing affected devices with models that have a better security track record if patching is delayed. 6) Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect buffer overflow attempts against this endpoint. These steps go beyond generic advice by focusing on access control, monitoring, and proactive device management specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cb9b7ef31ef0b56872a

Added to database: 2/25/2026, 9:42:17 PM

Last enriched: 2/28/2026, 5:43:17 AM

Last updated: 4/11/2026, 9:25:52 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses