CVE-2024-42942: n/a
CVE-2024-42942 is a stack overflow vulnerability found in Tenda FH1201 router firmware version 1. 2. 0. 14 (408). The flaw exists in the frmL7ImForm function, specifically via the page parameter, and can be triggered by a crafted POST request. Exploiting this vulnerability results in a Denial of Service (DoS) condition, causing the device to crash or become unresponsive. No authentication or user interaction is required to exploit this issue, and it can be triggered remotely over the network. The vulnerability has a CVSS score of 6. 5, indicating a medium severity level, with no impact on confidentiality or integrity, only availability. There are currently no known exploits in the wild, and no patches have been published yet.
AI Analysis
Technical Summary
CVE-2024-42942 is a stack-based buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14 (build 408). The vulnerability resides in the frmL7ImForm function, where improper handling of the 'page' parameter in HTTP POST requests allows an attacker to overflow the stack. This can be exploited remotely without authentication or user interaction by sending a specially crafted POST request to the vulnerable router's web management interface. The overflow leads to a Denial of Service (DoS) condition, causing the device to crash or reboot, thereby disrupting network availability. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The CVSS v3.1 base score is 6.5, reflecting medium severity, with attack vector as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H). No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The lack of authentication requirement and ease of exploitation increase the risk of automated or targeted attacks against exposed devices. This vulnerability primarily affects Tenda FH1201 routers running the specified firmware version, which are commonly used in residential and small office environments.
Potential Impact
The primary impact of CVE-2024-42942 is a Denial of Service condition on affected Tenda FH1201 routers, which can disrupt network connectivity for users relying on these devices. This can lead to loss of internet access, interruption of business operations, and potential cascading effects on dependent systems and services. Since the vulnerability does not affect confidentiality or integrity, data theft or manipulation is not a direct concern. However, the availability impact can be significant in environments where these routers serve as critical network gateways. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks, especially if the device management interface is exposed to adjacent networks or the internet. Organizations with large deployments of these routers, or those in environments with limited network segmentation, face higher risks. Additionally, service providers or managed network operators using these devices may experience customer impact and reputational damage if exploited. The absence of patches at present means that mitigation relies on network controls and monitoring until updates are available.
Mitigation Recommendations
1. Immediately restrict access to the router's management interface by limiting it to trusted internal networks only; disable remote management if enabled. 2. Implement network segmentation to isolate the router management interface from untrusted or public networks, reducing exposure to adjacent attackers. 3. Monitor network traffic for unusual or malformed POST requests targeting the router's web interface, which may indicate exploitation attempts. 4. Regularly check for firmware updates from Tenda and apply patches promptly once a fix for this vulnerability is released. 5. Consider deploying intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts against this specific vulnerability. 6. If possible, replace affected devices with models that have received security updates or have a better security track record. 7. Educate network administrators about this vulnerability and the importance of securing device management interfaces. 8. Maintain backups of router configurations to enable quick recovery in case of device failure due to exploitation.
Affected Countries
China, United States, India, Brazil, Russia, Germany, United Kingdom, France, Italy, Spain
CVE-2024-42942: n/a
Description
CVE-2024-42942 is a stack overflow vulnerability found in Tenda FH1201 router firmware version 1. 2. 0. 14 (408). The flaw exists in the frmL7ImForm function, specifically via the page parameter, and can be triggered by a crafted POST request. Exploiting this vulnerability results in a Denial of Service (DoS) condition, causing the device to crash or become unresponsive. No authentication or user interaction is required to exploit this issue, and it can be triggered remotely over the network. The vulnerability has a CVSS score of 6. 5, indicating a medium severity level, with no impact on confidentiality or integrity, only availability. There are currently no known exploits in the wild, and no patches have been published yet.
AI-Powered Analysis
Technical Analysis
CVE-2024-42942 is a stack-based buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14 (build 408). The vulnerability resides in the frmL7ImForm function, where improper handling of the 'page' parameter in HTTP POST requests allows an attacker to overflow the stack. This can be exploited remotely without authentication or user interaction by sending a specially crafted POST request to the vulnerable router's web management interface. The overflow leads to a Denial of Service (DoS) condition, causing the device to crash or reboot, thereby disrupting network availability. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The CVSS v3.1 base score is 6.5, reflecting medium severity, with attack vector as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H). No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The lack of authentication requirement and ease of exploitation increase the risk of automated or targeted attacks against exposed devices. This vulnerability primarily affects Tenda FH1201 routers running the specified firmware version, which are commonly used in residential and small office environments.
Potential Impact
The primary impact of CVE-2024-42942 is a Denial of Service condition on affected Tenda FH1201 routers, which can disrupt network connectivity for users relying on these devices. This can lead to loss of internet access, interruption of business operations, and potential cascading effects on dependent systems and services. Since the vulnerability does not affect confidentiality or integrity, data theft or manipulation is not a direct concern. However, the availability impact can be significant in environments where these routers serve as critical network gateways. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks, especially if the device management interface is exposed to adjacent networks or the internet. Organizations with large deployments of these routers, or those in environments with limited network segmentation, face higher risks. Additionally, service providers or managed network operators using these devices may experience customer impact and reputational damage if exploited. The absence of patches at present means that mitigation relies on network controls and monitoring until updates are available.
Mitigation Recommendations
1. Immediately restrict access to the router's management interface by limiting it to trusted internal networks only; disable remote management if enabled. 2. Implement network segmentation to isolate the router management interface from untrusted or public networks, reducing exposure to adjacent attackers. 3. Monitor network traffic for unusual or malformed POST requests targeting the router's web interface, which may indicate exploitation attempts. 4. Regularly check for firmware updates from Tenda and apply patches promptly once a fix for this vulnerability is released. 5. Consider deploying intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts against this specific vulnerability. 6. If possible, replace affected devices with models that have received security updates or have a better security track record. 7. Educate network administrators about this vulnerability and the importance of securing device management interfaces. 8. Maintain backups of router configurations to enable quick recovery in case of device failure due to exploitation.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cd2b7ef31ef0b5694f4
Added to database: 2/25/2026, 9:42:42 PM
Last enriched: 2/26/2026, 7:38:59 AM
Last updated: 2/26/2026, 7:59:09 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.