CVE-2024-42940: n/a
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromP2pListFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
AI Analysis
Technical Summary
CVE-2024-42940 identifies a stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1.2.0.14 (build 408). The vulnerability arises from improper input validation of the 'page' parameter within the fromP2pListFilter function. When a specially crafted POST request containing a maliciously crafted 'page' parameter is sent to the device, it triggers a stack overflow condition. This overflow can overwrite the stack memory, leading to a crash of the router's firmware process, resulting in a Denial of Service (DoS). The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The attack vector is adjacent network (AV:A), requiring low attack complexity (AC:L) and low privileges (PR:L), with no user interaction (UI:N) needed. The scope is unchanged (S:U), and the impact affects availability only (A:H), with no impact on confidentiality or integrity. No patches or exploits are currently publicly available, but the vulnerability poses a risk to network stability and device availability. The flaw could be leveraged by attackers with network access to disrupt connectivity for users relying on this router model.
Potential Impact
The primary impact of CVE-2024-42940 is the potential for Denial of Service on affected Tenda FH1201 routers. This can disrupt internet connectivity and network services for individuals or organizations relying on these devices. In environments where these routers are used as critical network gateways, such as small offices or home offices, the DoS could lead to operational downtime and loss of productivity. Although the vulnerability does not allow for data theft or device takeover, the loss of availability can affect business continuity and user experience. Since exploitation requires network access with low privileges, attackers on the same local or adjacent network segment could exploit this vulnerability to cause service interruptions. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available. Organizations using this router model should consider the impact on network reliability and plan accordingly.
Mitigation Recommendations
To mitigate CVE-2024-42940, organizations should first verify if they are using the Tenda FH1201 router with firmware version 1.2.0.14 (408). Since no official patch is currently available, immediate mitigation steps include restricting access to the router's management interface to trusted networks only, ideally via VLAN segmentation or firewall rules that block unauthorized POST requests to the vulnerable function. Network administrators should disable remote management features if enabled and monitor network traffic for unusual POST requests targeting the router. Implementing network segmentation to isolate IoT and consumer-grade routers from critical infrastructure can reduce risk. Regularly check Tenda's official channels for firmware updates addressing this vulnerability and apply patches promptly once released. Additionally, consider replacing affected devices with models from vendors with stronger security track records if mitigation is not feasible. Employ network monitoring tools to detect and alert on anomalous traffic patterns indicative of exploitation attempts.
Affected Countries
China, India, Russia, Brazil, United States, Indonesia, Vietnam, Thailand, Mexico, South Africa
CVE-2024-42940: n/a
Description
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromP2pListFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-42940 identifies a stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1.2.0.14 (build 408). The vulnerability arises from improper input validation of the 'page' parameter within the fromP2pListFilter function. When a specially crafted POST request containing a maliciously crafted 'page' parameter is sent to the device, it triggers a stack overflow condition. This overflow can overwrite the stack memory, leading to a crash of the router's firmware process, resulting in a Denial of Service (DoS). The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The attack vector is adjacent network (AV:A), requiring low attack complexity (AC:L) and low privileges (PR:L), with no user interaction (UI:N) needed. The scope is unchanged (S:U), and the impact affects availability only (A:H), with no impact on confidentiality or integrity. No patches or exploits are currently publicly available, but the vulnerability poses a risk to network stability and device availability. The flaw could be leveraged by attackers with network access to disrupt connectivity for users relying on this router model.
Potential Impact
The primary impact of CVE-2024-42940 is the potential for Denial of Service on affected Tenda FH1201 routers. This can disrupt internet connectivity and network services for individuals or organizations relying on these devices. In environments where these routers are used as critical network gateways, such as small offices or home offices, the DoS could lead to operational downtime and loss of productivity. Although the vulnerability does not allow for data theft or device takeover, the loss of availability can affect business continuity and user experience. Since exploitation requires network access with low privileges, attackers on the same local or adjacent network segment could exploit this vulnerability to cause service interruptions. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available. Organizations using this router model should consider the impact on network reliability and plan accordingly.
Mitigation Recommendations
To mitigate CVE-2024-42940, organizations should first verify if they are using the Tenda FH1201 router with firmware version 1.2.0.14 (408). Since no official patch is currently available, immediate mitigation steps include restricting access to the router's management interface to trusted networks only, ideally via VLAN segmentation or firewall rules that block unauthorized POST requests to the vulnerable function. Network administrators should disable remote management features if enabled and monitor network traffic for unusual POST requests targeting the router. Implementing network segmentation to isolate IoT and consumer-grade routers from critical infrastructure can reduce risk. Regularly check Tenda's official channels for firmware updates addressing this vulnerability and apply patches promptly once released. Additionally, consider replacing affected devices with models from vendors with stronger security track records if mitigation is not feasible. Employ network monitoring tools to detect and alert on anomalous traffic patterns indicative of exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cd2b7ef31ef0b5694ee
Added to database: 2/25/2026, 9:42:42 PM
Last enriched: 2/26/2026, 7:38:17 AM
Last updated: 4/12/2026, 6:14:26 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.