Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42974: n/a

0
Medium
VulnerabilityCVE-2024-42974cvecve-2024-42974
Published: Thu Aug 15 2024 (08/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-42974 is a stack overflow vulnerability found in Tenda FH1206 router firmware version v02. 03. 01. 35. The flaw exists in the fromwebExcptypemanFilter function, specifically via the 'page' parameter. An attacker can exploit this by sending a crafted POST request, causing a Denial of Service (DoS) condition. The vulnerability does not require authentication or user interaction and has a CVSS score of 6. 5, indicating medium severity. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability impacts availability but does not affect confidentiality or integrity.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:40:25 UTC

Technical Analysis

CVE-2024-42974 is a stack-based buffer overflow vulnerability identified in the Tenda FH1206 router firmware version v02.03.01.35. The vulnerability arises from improper handling of the 'page' parameter within the fromwebExcptypemanFilter function. Specifically, the function fails to properly validate or limit the size of input data, allowing an attacker to overflow the stack by sending a specially crafted POST request. This overflow can overwrite the stack frame, leading to a crash of the affected process and resulting in a Denial of Service (DoS) condition. The vulnerability does not require any privileges or user interaction to exploit, making it accessible remotely by unauthenticated attackers over the network. The CVSS 3.1 base score of 6.5 reflects the medium severity, primarily due to the impact on availability without affecting confidentiality or integrity. No known public exploits or patches are currently available, indicating that the vulnerability is newly disclosed. The underlying weakness corresponds to CWE-121 (Stack-based Buffer Overflow), a common and well-understood software flaw. This vulnerability could be leveraged by attackers to disrupt network connectivity or degrade service availability for users relying on the affected Tenda router model.

Potential Impact

The primary impact of CVE-2024-42974 is the potential for Denial of Service (DoS) attacks against networks using the Tenda FH1206 router with the vulnerable firmware. Successful exploitation can cause the router's web management interface or related services to crash, leading to temporary loss of network management capabilities or even broader network outages if the device becomes unresponsive. This can disrupt business operations, especially for small to medium enterprises or home users relying on this device for internet connectivity. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is unlikely. However, the ease of remote exploitation without authentication increases the risk of widespread disruption. Organizations with critical reliance on these routers for network access or management could face operational downtime, impacting productivity and potentially leading to financial losses or reputational damage. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability remains a concern until patched.

Mitigation Recommendations

1. Monitor network traffic for unusual or malformed POST requests targeting the router's web interface, especially those containing suspicious 'page' parameter values. 2. Restrict access to the router's management interface by limiting exposure to untrusted networks; use firewall rules to allow management only from trusted IP addresses or internal networks. 3. Disable remote management features if not required to reduce the attack surface. 4. Regularly check for firmware updates from Tenda and apply them promptly once a patch addressing this vulnerability is released. 5. Implement network segmentation to isolate critical devices and reduce the impact of a compromised router. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) capable of identifying and blocking exploitation attempts targeting this vulnerability. 7. Maintain backups of router configurations to facilitate rapid recovery in case of a DoS event. 8. Engage with Tenda support channels to obtain information on patch timelines and interim mitigation advice.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd4b7ef31ef0b5695f4

Added to database: 2/25/2026, 9:42:44 PM

Last enriched: 2/26/2026, 7:40:25 AM

Last updated: 2/26/2026, 12:44:08 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats