Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41466: n/a

0
High
VulnerabilityCVE-2024-41466cvecve-2024-41466
Published: Wed Jul 24 2024 (07/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1201 v1.2.0.14 was discovered to contain a stack-based buffer overflow vulnerability via the page parameter at ip/goform/NatStaticSetting.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:44:06 UTC

Technical Analysis

CVE-2024-41466 is a stack-based buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14. The flaw exists in the handling of the 'page' parameter within the ip/goform/NatStaticSetting endpoint, where insufficient bounds checking allows an attacker to overflow the stack buffer. This vulnerability is exploitable remotely over the network without requiring any authentication or user interaction, making it accessible to unauthenticated attackers. The exploitation of this vulnerability can lead to a denial of service (DoS) condition by crashing the router, thereby disrupting network availability. The vulnerability is classified under CWE-121, which relates to stack-based buffer overflows, a common and critical memory corruption issue. The CVSS 3.1 score of 7.5 reflects a high severity level, primarily due to the ease of exploitation (network vector, no privileges or user interaction needed) and the impact on availability. No known exploits have been reported in the wild yet, and no official patches or mitigations have been published by Tenda at the time of disclosure. Given the nature of the vulnerability, attackers could craft malicious HTTP requests targeting the vulnerable endpoint to trigger the overflow and cause the device to reboot or become unresponsive. This could be leveraged in targeted attacks against networks relying on this router model or in broader denial of service campaigns.

Potential Impact

The primary impact of CVE-2024-41466 is on the availability of affected Tenda FH1201 routers. Successful exploitation results in a denial of service, causing the router to crash or reboot, which disrupts network connectivity for all devices relying on it. For organizations, this can lead to significant operational downtime, loss of productivity, and potential disruption of critical services, especially in environments where these routers serve as primary network gateways. Although the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can indirectly affect business continuity and incident response capabilities. Since no authentication is required, attackers can exploit this vulnerability remotely, increasing the risk of widespread attacks. The absence of known exploits in the wild currently limits immediate risk, but the availability of technical details and the high severity score suggest that attackers may develop exploits soon. Organizations using Tenda FH1201 routers in enterprise, SMB, or critical infrastructure contexts are particularly vulnerable to targeted denial of service attacks that could degrade or halt network operations.

Mitigation Recommendations

Until an official patch is released by Tenda, organizations should implement specific mitigations to reduce exposure. First, restrict access to the router's management interface by limiting it to trusted internal networks and blocking external access via firewall rules or network segmentation. Disable remote management features if not required. Employ network intrusion detection or prevention systems (IDS/IPS) to monitor and block suspicious HTTP requests targeting the ip/goform/NatStaticSetting endpoint, especially those containing unusual or oversized 'page' parameter values. Regularly audit router configurations and logs for signs of exploitation attempts. Consider deploying redundant network paths or failover devices to maintain availability in case of router failure. Engage with Tenda support channels to obtain updates on patches or firmware upgrades addressing this vulnerability. Finally, maintain an inventory of affected devices and plan for timely firmware updates once fixes become available to fully remediate the vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cb9b7ef31ef0b568733

Added to database: 2/25/2026, 9:42:17 PM

Last enriched: 2/28/2026, 5:44:06 AM

Last updated: 4/12/2026, 3:35:47 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses