CVE-2024-42973: n/a
Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromSetlpBind function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-42973 affects the Tenda FH1206 router running firmware version v02.03.01.35. It is a stack-based buffer overflow (CWE-121) located in the fromSetlpBind function, specifically triggered by the page parameter in HTTP POST requests. When an attacker sends a specially crafted POST request containing malicious data in the page parameter, it causes the router's software to overflow its stack buffer, leading to a crash or reboot of the device. This results in a Denial of Service (DoS) condition, rendering the router temporarily unavailable and disrupting network connectivity for users relying on it. The vulnerability can be exploited remotely but requires the attacker to be on the same local or adjacent network segment (Attack Vector: Adjacent). No privileges or authentication are needed, and no user interaction is required, making it relatively easy to exploit within the attack vector scope. The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. Currently, no public exploits or patches have been reported, so mitigation relies on network controls and monitoring until a firmware update is released by the vendor.
Potential Impact
The primary impact of CVE-2024-42973 is a Denial of Service on affected Tenda FH1206 routers, which can disrupt network availability for home users, small businesses, or any environment relying on this device. A successful exploit causes the router to crash or reboot, interrupting internet access and internal network communications. This can lead to operational downtime, loss of productivity, and potential secondary impacts if critical services depend on continuous connectivity. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is not a direct concern. However, repeated or timed exploitation could be used as part of a larger attack strategy to degrade network infrastructure. Organizations with many deployed devices could face widespread disruptions if targeted. The lack of authentication and user interaction requirements increases the risk within local network environments, especially in poorly segmented or shared networks.
Mitigation Recommendations
To mitigate CVE-2024-42973, organizations should first verify if they are using the Tenda FH1206 router with firmware version v02.03.01.35. Until an official patch is released, network administrators should implement strict network segmentation to isolate vulnerable devices from untrusted or guest networks, reducing the risk of local attackers exploiting the flaw. Employing firewall rules to restrict access to the router’s management interface and blocking unsolicited POST requests from untrusted sources can help limit exposure. Monitoring network traffic for unusual POST requests targeting the page parameter may provide early detection of exploitation attempts. Additionally, organizations should maintain regular backups of router configurations and prepare for rapid device recovery in case of DoS incidents. Finally, stay informed about vendor advisories and promptly apply firmware updates once available to remediate the vulnerability permanently.
Affected Countries
China, India, Russia, Brazil, Indonesia, Vietnam, Thailand, Egypt, South Africa, Mexico
CVE-2024-42973: n/a
Description
Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromSetlpBind function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2024-42973 affects the Tenda FH1206 router running firmware version v02.03.01.35. It is a stack-based buffer overflow (CWE-121) located in the fromSetlpBind function, specifically triggered by the page parameter in HTTP POST requests. When an attacker sends a specially crafted POST request containing malicious data in the page parameter, it causes the router's software to overflow its stack buffer, leading to a crash or reboot of the device. This results in a Denial of Service (DoS) condition, rendering the router temporarily unavailable and disrupting network connectivity for users relying on it. The vulnerability can be exploited remotely but requires the attacker to be on the same local or adjacent network segment (Attack Vector: Adjacent). No privileges or authentication are needed, and no user interaction is required, making it relatively easy to exploit within the attack vector scope. The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. Currently, no public exploits or patches have been reported, so mitigation relies on network controls and monitoring until a firmware update is released by the vendor.
Potential Impact
The primary impact of CVE-2024-42973 is a Denial of Service on affected Tenda FH1206 routers, which can disrupt network availability for home users, small businesses, or any environment relying on this device. A successful exploit causes the router to crash or reboot, interrupting internet access and internal network communications. This can lead to operational downtime, loss of productivity, and potential secondary impacts if critical services depend on continuous connectivity. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is not a direct concern. However, repeated or timed exploitation could be used as part of a larger attack strategy to degrade network infrastructure. Organizations with many deployed devices could face widespread disruptions if targeted. The lack of authentication and user interaction requirements increases the risk within local network environments, especially in poorly segmented or shared networks.
Mitigation Recommendations
To mitigate CVE-2024-42973, organizations should first verify if they are using the Tenda FH1206 router with firmware version v02.03.01.35. Until an official patch is released, network administrators should implement strict network segmentation to isolate vulnerable devices from untrusted or guest networks, reducing the risk of local attackers exploiting the flaw. Employing firewall rules to restrict access to the router’s management interface and blocking unsolicited POST requests from untrusted sources can help limit exposure. Monitoring network traffic for unusual POST requests targeting the page parameter may provide early detection of exploitation attempts. Additionally, organizations should maintain regular backups of router configurations and prepare for rapid device recovery in case of DoS incidents. Finally, stay informed about vendor advisories and promptly apply firmware updates once available to remediate the vulnerability permanently.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cd4b7ef31ef0b5695f1
Added to database: 2/25/2026, 9:42:44 PM
Last enriched: 2/26/2026, 7:40:11 AM
Last updated: 4/12/2026, 12:20:23 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.