Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42973: n/a

0
Medium
VulnerabilityCVE-2024-42973cvecve-2024-42973
Published: Thu Aug 15 2024 (08/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-42973 is a stack overflow vulnerability found in Tenda FH1206 router firmware version v02. 03. 01. 35. The flaw exists in the fromSetlpBind function, triggered via the page parameter in a crafted POST request. Exploiting this vulnerability can cause a Denial of Service (DoS) condition, crashing the device and disrupting network availability. No authentication or user interaction is required, and the attack vector is remote but requires adjacent network access (AV:A). The vulnerability does not impact confidentiality or integrity but solely affects availability. There are no known exploits in the wild as of now, and no patches have been published. Organizations using this router model should monitor for firmware updates and consider network segmentation to limit exposure.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:40:11 UTC

Technical Analysis

The vulnerability identified as CVE-2024-42973 affects the Tenda FH1206 router running firmware version v02.03.01.35. It is a stack-based buffer overflow (CWE-121) located in the fromSetlpBind function, specifically triggered by the page parameter in HTTP POST requests. When an attacker sends a specially crafted POST request containing malicious data in the page parameter, it causes the router's software to overflow its stack buffer, leading to a crash or reboot of the device. This results in a Denial of Service (DoS) condition, rendering the router temporarily unavailable and disrupting network connectivity for users relying on it. The vulnerability can be exploited remotely but requires the attacker to be on the same local or adjacent network segment (Attack Vector: Adjacent). No privileges or authentication are needed, and no user interaction is required, making it relatively easy to exploit within the attack vector scope. The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. Currently, no public exploits or patches have been reported, so mitigation relies on network controls and monitoring until a firmware update is released by the vendor.

Potential Impact

The primary impact of CVE-2024-42973 is a Denial of Service on affected Tenda FH1206 routers, which can disrupt network availability for home users, small businesses, or any environment relying on this device. A successful exploit causes the router to crash or reboot, interrupting internet access and internal network communications. This can lead to operational downtime, loss of productivity, and potential secondary impacts if critical services depend on continuous connectivity. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is not a direct concern. However, repeated or timed exploitation could be used as part of a larger attack strategy to degrade network infrastructure. Organizations with many deployed devices could face widespread disruptions if targeted. The lack of authentication and user interaction requirements increases the risk within local network environments, especially in poorly segmented or shared networks.

Mitigation Recommendations

To mitigate CVE-2024-42973, organizations should first verify if they are using the Tenda FH1206 router with firmware version v02.03.01.35. Until an official patch is released, network administrators should implement strict network segmentation to isolate vulnerable devices from untrusted or guest networks, reducing the risk of local attackers exploiting the flaw. Employing firewall rules to restrict access to the router’s management interface and blocking unsolicited POST requests from untrusted sources can help limit exposure. Monitoring network traffic for unusual POST requests targeting the page parameter may provide early detection of exploitation attempts. Additionally, organizations should maintain regular backups of router configurations and prepare for rapid device recovery in case of DoS incidents. Finally, stay informed about vendor advisories and promptly apply firmware updates once available to remediate the vulnerability permanently.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd4b7ef31ef0b5695f1

Added to database: 2/25/2026, 9:42:44 PM

Last enriched: 2/26/2026, 7:40:11 AM

Last updated: 2/26/2026, 9:41:10 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats