CVE-2024-42948: n/a
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the delno parameter in the fromPptpUserSetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
AI Analysis
Technical Summary
CVE-2024-42948 identifies a stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1.2.0.14 (build 408). The vulnerability arises from improper handling of the delno parameter within the fromPptpUserSetting function. When a specially crafted POST request is sent to the device, it triggers a stack overflow condition, leading to a crash and resulting in a Denial of Service (DoS). This vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating that the software writes data outside the boundaries of allocated memory on the stack. The flaw can be exploited remotely without any authentication or user interaction, making it accessible to unauthenticated attackers on the network. The CVSS v3.1 base score of 7.5 reflects a high severity due to the ease of exploitation and the impact on availability. No patches or firmware updates have been published yet, and no known exploits have been observed in the wild. The vulnerability primarily affects the Tenda FH1201 router, a device used in consumer and small business environments, which may expose numerous users to potential service disruptions if exploited.
Potential Impact
The primary impact of CVE-2024-42948 is the disruption of network connectivity due to the Denial of Service condition caused by the router crashing. This can interrupt internet access and internal network communications for affected users, potentially impacting business operations, remote work, and critical online services relying on stable connectivity. Since the vulnerability can be exploited remotely without authentication, attackers can target vulnerable devices en masse, potentially leading to widespread outages in environments where these routers are deployed. Although the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can have significant operational and financial consequences, especially for small businesses and home users relying on these devices for internet access. Additionally, repeated exploitation attempts could be used as part of a larger attack campaign to degrade network infrastructure or distract from other malicious activities.
Mitigation Recommendations
1. Monitor Tenda’s official channels for firmware updates or patches addressing CVE-2024-42948 and apply them promptly once available. 2. Restrict access to the router’s management interfaces by limiting exposure to trusted networks only, ideally disabling remote management features if not required. 3. Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive systems. 4. Deploy network-level intrusion detection and prevention systems (IDS/IPS) to detect and block suspicious POST requests targeting the delno parameter or unusual traffic patterns. 5. Use firewall rules to restrict inbound traffic to the router’s administrative ports, allowing only authorized IP addresses. 6. Regularly audit network devices for firmware versions and configuration to ensure compliance with security best practices. 7. Educate users on the risks of using outdated firmware and encourage timely updates to reduce exposure.
Affected Countries
China, India, Russia, Brazil, United States, Indonesia, Vietnam, Thailand, Malaysia, Mexico
CVE-2024-42948: n/a
Description
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the delno parameter in the fromPptpUserSetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-42948 identifies a stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1.2.0.14 (build 408). The vulnerability arises from improper handling of the delno parameter within the fromPptpUserSetting function. When a specially crafted POST request is sent to the device, it triggers a stack overflow condition, leading to a crash and resulting in a Denial of Service (DoS). This vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating that the software writes data outside the boundaries of allocated memory on the stack. The flaw can be exploited remotely without any authentication or user interaction, making it accessible to unauthenticated attackers on the network. The CVSS v3.1 base score of 7.5 reflects a high severity due to the ease of exploitation and the impact on availability. No patches or firmware updates have been published yet, and no known exploits have been observed in the wild. The vulnerability primarily affects the Tenda FH1201 router, a device used in consumer and small business environments, which may expose numerous users to potential service disruptions if exploited.
Potential Impact
The primary impact of CVE-2024-42948 is the disruption of network connectivity due to the Denial of Service condition caused by the router crashing. This can interrupt internet access and internal network communications for affected users, potentially impacting business operations, remote work, and critical online services relying on stable connectivity. Since the vulnerability can be exploited remotely without authentication, attackers can target vulnerable devices en masse, potentially leading to widespread outages in environments where these routers are deployed. Although the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can have significant operational and financial consequences, especially for small businesses and home users relying on these devices for internet access. Additionally, repeated exploitation attempts could be used as part of a larger attack campaign to degrade network infrastructure or distract from other malicious activities.
Mitigation Recommendations
1. Monitor Tenda’s official channels for firmware updates or patches addressing CVE-2024-42948 and apply them promptly once available. 2. Restrict access to the router’s management interfaces by limiting exposure to trusted networks only, ideally disabling remote management features if not required. 3. Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive systems. 4. Deploy network-level intrusion detection and prevention systems (IDS/IPS) to detect and block suspicious POST requests targeting the delno parameter or unusual traffic patterns. 5. Use firewall rules to restrict inbound traffic to the router’s administrative ports, allowing only authorized IP addresses. 6. Regularly audit network devices for firmware versions and configuration to ensure compliance with security best practices. 7. Educate users on the risks of using outdated firmware and encourage timely updates to reduce exposure.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cd2b7ef31ef0b569549
Added to database: 2/25/2026, 9:42:42 PM
Last enriched: 2/28/2026, 6:21:15 AM
Last updated: 4/12/2026, 3:47:41 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.