CVE-2024-42940: n/a
CVE-2024-42940 is a stack overflow vulnerability in the Tenda FH1201 router firmware version 1. 2. 0. 14 (408). The flaw exists in the fromP2pListFilter function, where the page parameter is improperly handled, allowing a crafted POST request to trigger a stack overflow. Exploiting this vulnerability results in a Denial of Service (DoS) condition, causing the device to crash or become unresponsive. The vulnerability requires local or adjacent network access with low privileges and does not require user interaction. No known exploits are currently observed in the wild. The CVSS score is 5. 7 (medium severity), reflecting the impact on availability without compromising confidentiality or integrity.
AI Analysis
Technical Summary
CVE-2024-42940 identifies a stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1.2.0.14 (build 408). The vulnerability arises from improper input validation of the 'page' parameter within the fromP2pListFilter function. When a specially crafted POST request containing a maliciously crafted 'page' parameter is sent to the device, it triggers a stack overflow condition. This overflow can overwrite the stack memory, leading to a crash of the router's firmware process, resulting in a Denial of Service (DoS). The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The attack vector is adjacent network (AV:A), requiring low attack complexity (AC:L) and low privileges (PR:L), with no user interaction (UI:N) needed. The scope is unchanged (S:U), and the impact affects availability only (A:H), with no impact on confidentiality or integrity. No patches or exploits are currently publicly available, but the vulnerability poses a risk to network stability and device availability. The flaw could be leveraged by attackers with network access to disrupt connectivity for users relying on this router model.
Potential Impact
The primary impact of CVE-2024-42940 is the potential for Denial of Service on affected Tenda FH1201 routers. This can disrupt internet connectivity and network services for individuals or organizations relying on these devices. In environments where these routers are used as critical network gateways, such as small offices or home offices, the DoS could lead to operational downtime and loss of productivity. Although the vulnerability does not allow for data theft or device takeover, the loss of availability can affect business continuity and user experience. Since exploitation requires network access with low privileges, attackers on the same local or adjacent network segment could exploit this vulnerability to cause service interruptions. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available. Organizations using this router model should consider the impact on network reliability and plan accordingly.
Mitigation Recommendations
To mitigate CVE-2024-42940, organizations should first verify if they are using the Tenda FH1201 router with firmware version 1.2.0.14 (408). Since no official patch is currently available, immediate mitigation steps include restricting access to the router's management interface to trusted networks only, ideally via VLAN segmentation or firewall rules that block unauthorized POST requests to the vulnerable function. Network administrators should disable remote management features if enabled and monitor network traffic for unusual POST requests targeting the router. Implementing network segmentation to isolate IoT and consumer-grade routers from critical infrastructure can reduce risk. Regularly check Tenda's official channels for firmware updates addressing this vulnerability and apply patches promptly once released. Additionally, consider replacing affected devices with models from vendors with stronger security track records if mitigation is not feasible. Employ network monitoring tools to detect and alert on anomalous traffic patterns indicative of exploitation attempts.
Affected Countries
China, India, Russia, Brazil, United States, Indonesia, Vietnam, Thailand, Mexico, South Africa
CVE-2024-42940: n/a
Description
CVE-2024-42940 is a stack overflow vulnerability in the Tenda FH1201 router firmware version 1. 2. 0. 14 (408). The flaw exists in the fromP2pListFilter function, where the page parameter is improperly handled, allowing a crafted POST request to trigger a stack overflow. Exploiting this vulnerability results in a Denial of Service (DoS) condition, causing the device to crash or become unresponsive. The vulnerability requires local or adjacent network access with low privileges and does not require user interaction. No known exploits are currently observed in the wild. The CVSS score is 5. 7 (medium severity), reflecting the impact on availability without compromising confidentiality or integrity.
AI-Powered Analysis
Technical Analysis
CVE-2024-42940 identifies a stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1.2.0.14 (build 408). The vulnerability arises from improper input validation of the 'page' parameter within the fromP2pListFilter function. When a specially crafted POST request containing a maliciously crafted 'page' parameter is sent to the device, it triggers a stack overflow condition. This overflow can overwrite the stack memory, leading to a crash of the router's firmware process, resulting in a Denial of Service (DoS). The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The attack vector is adjacent network (AV:A), requiring low attack complexity (AC:L) and low privileges (PR:L), with no user interaction (UI:N) needed. The scope is unchanged (S:U), and the impact affects availability only (A:H), with no impact on confidentiality or integrity. No patches or exploits are currently publicly available, but the vulnerability poses a risk to network stability and device availability. The flaw could be leveraged by attackers with network access to disrupt connectivity for users relying on this router model.
Potential Impact
The primary impact of CVE-2024-42940 is the potential for Denial of Service on affected Tenda FH1201 routers. This can disrupt internet connectivity and network services for individuals or organizations relying on these devices. In environments where these routers are used as critical network gateways, such as small offices or home offices, the DoS could lead to operational downtime and loss of productivity. Although the vulnerability does not allow for data theft or device takeover, the loss of availability can affect business continuity and user experience. Since exploitation requires network access with low privileges, attackers on the same local or adjacent network segment could exploit this vulnerability to cause service interruptions. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available. Organizations using this router model should consider the impact on network reliability and plan accordingly.
Mitigation Recommendations
To mitigate CVE-2024-42940, organizations should first verify if they are using the Tenda FH1201 router with firmware version 1.2.0.14 (408). Since no official patch is currently available, immediate mitigation steps include restricting access to the router's management interface to trusted networks only, ideally via VLAN segmentation or firewall rules that block unauthorized POST requests to the vulnerable function. Network administrators should disable remote management features if enabled and monitor network traffic for unusual POST requests targeting the router. Implementing network segmentation to isolate IoT and consumer-grade routers from critical infrastructure can reduce risk. Regularly check Tenda's official channels for firmware updates addressing this vulnerability and apply patches promptly once released. Additionally, consider replacing affected devices with models from vendors with stronger security track records if mitigation is not feasible. Employ network monitoring tools to detect and alert on anomalous traffic patterns indicative of exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cd2b7ef31ef0b5694ee
Added to database: 2/25/2026, 9:42:42 PM
Last enriched: 2/26/2026, 7:38:17 AM
Last updated: 2/26/2026, 12:45:31 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14343: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dokuzsoft Technology Ltd. E-Commerce Product
HighCVE-2026-1198: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Simple SA Simple.ERP
HighCVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.