CVE-2024-42949: n/a
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the qos parameter in the fromqossetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
AI Analysis
Technical Summary
CVE-2024-42949 identifies a stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1.2.0.14 (build 408). The vulnerability arises from improper handling of the qos parameter within the fromqossetting function. When a specially crafted POST request containing malicious qos parameter data is sent to the device, it causes a stack overflow, which leads to a denial of service (DoS) by crashing or destabilizing the router. This vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The attack vector is remote and requires no privileges or user interaction, making it accessible to unauthenticated attackers on the network. The CVSS v3.1 base score of 6.5 reflects a medium severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No patches or mitigations have been officially released at the time of publication, and no known exploits have been reported in the wild. The vulnerability primarily threatens network availability by causing router crashes or reboots, potentially disrupting connectivity for all devices relying on the affected router. The lack of authentication requirements and ease of exploitation increase the risk for networks where the device is exposed or accessible by untrusted users.
Potential Impact
The primary impact of CVE-2024-42949 is denial of service, which can disrupt network connectivity for organizations using the affected Tenda FH1201 router firmware. This can lead to downtime of critical network infrastructure, affecting business operations, communications, and access to internet resources. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is not a direct concern. However, availability loss can have cascading effects, especially in environments relying on continuous network uptime such as small to medium enterprises, home offices, or branch networks. The ease of exploitation without authentication and user interaction means attackers can remotely trigger outages, potentially as part of larger denial-of-service campaigns or targeted attacks. The absence of known exploits in the wild reduces immediate risk but also indicates that organizations should proactively address the vulnerability before exploitation occurs. The lack of patches means affected users must rely on network-level mitigations or device replacement to maintain service continuity.
Mitigation Recommendations
1. Immediately restrict network access to the Tenda FH1201 router’s management interfaces, especially blocking POST requests to QoS-related endpoints from untrusted or external networks. 2. Implement network segmentation to isolate the vulnerable router from critical systems and reduce exposure to potential attackers. 3. Monitor network traffic for anomalous POST requests targeting the qos parameter or unusual router behavior indicative of crashes or reboots. 4. If possible, disable QoS features temporarily to reduce attack surface until a firmware update is available. 5. Contact Tenda support or monitor official channels for firmware updates or patches addressing this vulnerability and apply them promptly once released. 6. Consider replacing the affected router with a device from a vendor with a stronger security track record if patching is delayed. 7. Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect and block exploit attempts targeting this vulnerability. 8. Educate network administrators about the vulnerability and ensure incident response plans include procedures for handling router DoS events.
Affected Countries
China, United States, India, Brazil, Russia, Germany, United Kingdom, France, Italy, Spain
CVE-2024-42949: n/a
Description
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the qos parameter in the fromqossetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-42949 identifies a stack-based buffer overflow vulnerability in the Tenda FH1201 router firmware version 1.2.0.14 (build 408). The vulnerability arises from improper handling of the qos parameter within the fromqossetting function. When a specially crafted POST request containing malicious qos parameter data is sent to the device, it causes a stack overflow, which leads to a denial of service (DoS) by crashing or destabilizing the router. This vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The attack vector is remote and requires no privileges or user interaction, making it accessible to unauthenticated attackers on the network. The CVSS v3.1 base score of 6.5 reflects a medium severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No patches or mitigations have been officially released at the time of publication, and no known exploits have been reported in the wild. The vulnerability primarily threatens network availability by causing router crashes or reboots, potentially disrupting connectivity for all devices relying on the affected router. The lack of authentication requirements and ease of exploitation increase the risk for networks where the device is exposed or accessible by untrusted users.
Potential Impact
The primary impact of CVE-2024-42949 is denial of service, which can disrupt network connectivity for organizations using the affected Tenda FH1201 router firmware. This can lead to downtime of critical network infrastructure, affecting business operations, communications, and access to internet resources. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is not a direct concern. However, availability loss can have cascading effects, especially in environments relying on continuous network uptime such as small to medium enterprises, home offices, or branch networks. The ease of exploitation without authentication and user interaction means attackers can remotely trigger outages, potentially as part of larger denial-of-service campaigns or targeted attacks. The absence of known exploits in the wild reduces immediate risk but also indicates that organizations should proactively address the vulnerability before exploitation occurs. The lack of patches means affected users must rely on network-level mitigations or device replacement to maintain service continuity.
Mitigation Recommendations
1. Immediately restrict network access to the Tenda FH1201 router’s management interfaces, especially blocking POST requests to QoS-related endpoints from untrusted or external networks. 2. Implement network segmentation to isolate the vulnerable router from critical systems and reduce exposure to potential attackers. 3. Monitor network traffic for anomalous POST requests targeting the qos parameter or unusual router behavior indicative of crashes or reboots. 4. If possible, disable QoS features temporarily to reduce attack surface until a firmware update is available. 5. Contact Tenda support or monitor official channels for firmware updates or patches addressing this vulnerability and apply them promptly once released. 6. Consider replacing the affected router with a device from a vendor with a stronger security track record if patching is delayed. 7. Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect and block exploit attempts targeting this vulnerability. 8. Educate network administrators about the vulnerability and ensure incident response plans include procedures for handling router DoS events.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cd2b7ef31ef0b56954c
Added to database: 2/25/2026, 9:42:42 PM
Last enriched: 2/28/2026, 6:21:27 AM
Last updated: 4/12/2026, 7:54:17 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.