CVE-2024-42973: n/a
CVE-2024-42973 is a stack overflow vulnerability found in Tenda FH1206 router firmware version v02. 03. 01. 35. The flaw exists in the fromSetlpBind function, triggered via the page parameter in a crafted POST request. Exploiting this vulnerability can cause a Denial of Service (DoS) condition, crashing the device and disrupting network availability. No authentication or user interaction is required, and the attack vector is remote but requires adjacent network access (AV:A). The vulnerability does not impact confidentiality or integrity but solely affects availability. There are no known exploits in the wild as of now, and no patches have been published. Organizations using this router model should monitor for firmware updates and consider network segmentation to limit exposure.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-42973 affects the Tenda FH1206 router running firmware version v02.03.01.35. It is a stack-based buffer overflow (CWE-121) located in the fromSetlpBind function, specifically triggered by the page parameter in HTTP POST requests. When an attacker sends a specially crafted POST request containing malicious data in the page parameter, it causes the router's software to overflow its stack buffer, leading to a crash or reboot of the device. This results in a Denial of Service (DoS) condition, rendering the router temporarily unavailable and disrupting network connectivity for users relying on it. The vulnerability can be exploited remotely but requires the attacker to be on the same local or adjacent network segment (Attack Vector: Adjacent). No privileges or authentication are needed, and no user interaction is required, making it relatively easy to exploit within the attack vector scope. The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. Currently, no public exploits or patches have been reported, so mitigation relies on network controls and monitoring until a firmware update is released by the vendor.
Potential Impact
The primary impact of CVE-2024-42973 is a Denial of Service on affected Tenda FH1206 routers, which can disrupt network availability for home users, small businesses, or any environment relying on this device. A successful exploit causes the router to crash or reboot, interrupting internet access and internal network communications. This can lead to operational downtime, loss of productivity, and potential secondary impacts if critical services depend on continuous connectivity. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is not a direct concern. However, repeated or timed exploitation could be used as part of a larger attack strategy to degrade network infrastructure. Organizations with many deployed devices could face widespread disruptions if targeted. The lack of authentication and user interaction requirements increases the risk within local network environments, especially in poorly segmented or shared networks.
Mitigation Recommendations
To mitigate CVE-2024-42973, organizations should first verify if they are using the Tenda FH1206 router with firmware version v02.03.01.35. Until an official patch is released, network administrators should implement strict network segmentation to isolate vulnerable devices from untrusted or guest networks, reducing the risk of local attackers exploiting the flaw. Employing firewall rules to restrict access to the router’s management interface and blocking unsolicited POST requests from untrusted sources can help limit exposure. Monitoring network traffic for unusual POST requests targeting the page parameter may provide early detection of exploitation attempts. Additionally, organizations should maintain regular backups of router configurations and prepare for rapid device recovery in case of DoS incidents. Finally, stay informed about vendor advisories and promptly apply firmware updates once available to remediate the vulnerability permanently.
Affected Countries
China, India, Russia, Brazil, Indonesia, Vietnam, Thailand, Egypt, South Africa, Mexico
CVE-2024-42973: n/a
Description
CVE-2024-42973 is a stack overflow vulnerability found in Tenda FH1206 router firmware version v02. 03. 01. 35. The flaw exists in the fromSetlpBind function, triggered via the page parameter in a crafted POST request. Exploiting this vulnerability can cause a Denial of Service (DoS) condition, crashing the device and disrupting network availability. No authentication or user interaction is required, and the attack vector is remote but requires adjacent network access (AV:A). The vulnerability does not impact confidentiality or integrity but solely affects availability. There are no known exploits in the wild as of now, and no patches have been published. Organizations using this router model should monitor for firmware updates and consider network segmentation to limit exposure.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-42973 affects the Tenda FH1206 router running firmware version v02.03.01.35. It is a stack-based buffer overflow (CWE-121) located in the fromSetlpBind function, specifically triggered by the page parameter in HTTP POST requests. When an attacker sends a specially crafted POST request containing malicious data in the page parameter, it causes the router's software to overflow its stack buffer, leading to a crash or reboot of the device. This results in a Denial of Service (DoS) condition, rendering the router temporarily unavailable and disrupting network connectivity for users relying on it. The vulnerability can be exploited remotely but requires the attacker to be on the same local or adjacent network segment (Attack Vector: Adjacent). No privileges or authentication are needed, and no user interaction is required, making it relatively easy to exploit within the attack vector scope. The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. Currently, no public exploits or patches have been reported, so mitigation relies on network controls and monitoring until a firmware update is released by the vendor.
Potential Impact
The primary impact of CVE-2024-42973 is a Denial of Service on affected Tenda FH1206 routers, which can disrupt network availability for home users, small businesses, or any environment relying on this device. A successful exploit causes the router to crash or reboot, interrupting internet access and internal network communications. This can lead to operational downtime, loss of productivity, and potential secondary impacts if critical services depend on continuous connectivity. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is not a direct concern. However, repeated or timed exploitation could be used as part of a larger attack strategy to degrade network infrastructure. Organizations with many deployed devices could face widespread disruptions if targeted. The lack of authentication and user interaction requirements increases the risk within local network environments, especially in poorly segmented or shared networks.
Mitigation Recommendations
To mitigate CVE-2024-42973, organizations should first verify if they are using the Tenda FH1206 router with firmware version v02.03.01.35. Until an official patch is released, network administrators should implement strict network segmentation to isolate vulnerable devices from untrusted or guest networks, reducing the risk of local attackers exploiting the flaw. Employing firewall rules to restrict access to the router’s management interface and blocking unsolicited POST requests from untrusted sources can help limit exposure. Monitoring network traffic for unusual POST requests targeting the page parameter may provide early detection of exploitation attempts. Additionally, organizations should maintain regular backups of router configurations and prepare for rapid device recovery in case of DoS incidents. Finally, stay informed about vendor advisories and promptly apply firmware updates once available to remediate the vulnerability permanently.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cd4b7ef31ef0b5695f1
Added to database: 2/25/2026, 9:42:44 PM
Last enriched: 2/26/2026, 7:40:11 AM
Last updated: 2/26/2026, 9:41:10 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.