Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42974: n/a

0
Medium
VulnerabilityCVE-2024-42974cvecve-2024-42974
Published: Thu Aug 15 2024 (08/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromwebExcptypemanFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:40:25 UTC

Technical Analysis

CVE-2024-42974 is a stack-based buffer overflow vulnerability identified in the Tenda FH1206 router firmware version v02.03.01.35. The vulnerability arises from improper handling of the 'page' parameter within the fromwebExcptypemanFilter function. Specifically, the function fails to properly validate or limit the size of input data, allowing an attacker to overflow the stack by sending a specially crafted POST request. This overflow can overwrite the stack frame, leading to a crash of the affected process and resulting in a Denial of Service (DoS) condition. The vulnerability does not require any privileges or user interaction to exploit, making it accessible remotely by unauthenticated attackers over the network. The CVSS 3.1 base score of 6.5 reflects the medium severity, primarily due to the impact on availability without affecting confidentiality or integrity. No known public exploits or patches are currently available, indicating that the vulnerability is newly disclosed. The underlying weakness corresponds to CWE-121 (Stack-based Buffer Overflow), a common and well-understood software flaw. This vulnerability could be leveraged by attackers to disrupt network connectivity or degrade service availability for users relying on the affected Tenda router model.

Potential Impact

The primary impact of CVE-2024-42974 is the potential for Denial of Service (DoS) attacks against networks using the Tenda FH1206 router with the vulnerable firmware. Successful exploitation can cause the router's web management interface or related services to crash, leading to temporary loss of network management capabilities or even broader network outages if the device becomes unresponsive. This can disrupt business operations, especially for small to medium enterprises or home users relying on this device for internet connectivity. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is unlikely. However, the ease of remote exploitation without authentication increases the risk of widespread disruption. Organizations with critical reliance on these routers for network access or management could face operational downtime, impacting productivity and potentially leading to financial losses or reputational damage. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability remains a concern until patched.

Mitigation Recommendations

1. Monitor network traffic for unusual or malformed POST requests targeting the router's web interface, especially those containing suspicious 'page' parameter values. 2. Restrict access to the router's management interface by limiting exposure to untrusted networks; use firewall rules to allow management only from trusted IP addresses or internal networks. 3. Disable remote management features if not required to reduce the attack surface. 4. Regularly check for firmware updates from Tenda and apply them promptly once a patch addressing this vulnerability is released. 5. Implement network segmentation to isolate critical devices and reduce the impact of a compromised router. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) capable of identifying and blocking exploitation attempts targeting this vulnerability. 7. Maintain backups of router configurations to facilitate rapid recovery in case of a DoS event. 8. Engage with Tenda support channels to obtain information on patch timelines and interim mitigation advice.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd4b7ef31ef0b5695f4

Added to database: 2/25/2026, 9:42:44 PM

Last enriched: 2/26/2026, 7:40:25 AM

Last updated: 4/12/2026, 6:21:56 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses