CVE-2024-42974: n/a
CVE-2024-42974 is a stack overflow vulnerability found in Tenda FH1206 router firmware version v02. 03. 01. 35. The flaw exists in the fromwebExcptypemanFilter function, specifically via the 'page' parameter. An attacker can exploit this by sending a crafted POST request, causing a Denial of Service (DoS) condition. The vulnerability does not require authentication or user interaction and has a CVSS score of 6. 5, indicating medium severity. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability impacts availability but does not affect confidentiality or integrity.
AI Analysis
Technical Summary
CVE-2024-42974 is a stack-based buffer overflow vulnerability identified in the Tenda FH1206 router firmware version v02.03.01.35. The vulnerability arises from improper handling of the 'page' parameter within the fromwebExcptypemanFilter function. Specifically, the function fails to properly validate or limit the size of input data, allowing an attacker to overflow the stack by sending a specially crafted POST request. This overflow can overwrite the stack frame, leading to a crash of the affected process and resulting in a Denial of Service (DoS) condition. The vulnerability does not require any privileges or user interaction to exploit, making it accessible remotely by unauthenticated attackers over the network. The CVSS 3.1 base score of 6.5 reflects the medium severity, primarily due to the impact on availability without affecting confidentiality or integrity. No known public exploits or patches are currently available, indicating that the vulnerability is newly disclosed. The underlying weakness corresponds to CWE-121 (Stack-based Buffer Overflow), a common and well-understood software flaw. This vulnerability could be leveraged by attackers to disrupt network connectivity or degrade service availability for users relying on the affected Tenda router model.
Potential Impact
The primary impact of CVE-2024-42974 is the potential for Denial of Service (DoS) attacks against networks using the Tenda FH1206 router with the vulnerable firmware. Successful exploitation can cause the router's web management interface or related services to crash, leading to temporary loss of network management capabilities or even broader network outages if the device becomes unresponsive. This can disrupt business operations, especially for small to medium enterprises or home users relying on this device for internet connectivity. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is unlikely. However, the ease of remote exploitation without authentication increases the risk of widespread disruption. Organizations with critical reliance on these routers for network access or management could face operational downtime, impacting productivity and potentially leading to financial losses or reputational damage. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability remains a concern until patched.
Mitigation Recommendations
1. Monitor network traffic for unusual or malformed POST requests targeting the router's web interface, especially those containing suspicious 'page' parameter values. 2. Restrict access to the router's management interface by limiting exposure to untrusted networks; use firewall rules to allow management only from trusted IP addresses or internal networks. 3. Disable remote management features if not required to reduce the attack surface. 4. Regularly check for firmware updates from Tenda and apply them promptly once a patch addressing this vulnerability is released. 5. Implement network segmentation to isolate critical devices and reduce the impact of a compromised router. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) capable of identifying and blocking exploitation attempts targeting this vulnerability. 7. Maintain backups of router configurations to facilitate rapid recovery in case of a DoS event. 8. Engage with Tenda support channels to obtain information on patch timelines and interim mitigation advice.
Affected Countries
China, India, Indonesia, Vietnam, Thailand, Brazil, Russia, South Africa, Mexico, Egypt
CVE-2024-42974: n/a
Description
CVE-2024-42974 is a stack overflow vulnerability found in Tenda FH1206 router firmware version v02. 03. 01. 35. The flaw exists in the fromwebExcptypemanFilter function, specifically via the 'page' parameter. An attacker can exploit this by sending a crafted POST request, causing a Denial of Service (DoS) condition. The vulnerability does not require authentication or user interaction and has a CVSS score of 6. 5, indicating medium severity. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability impacts availability but does not affect confidentiality or integrity.
AI-Powered Analysis
Technical Analysis
CVE-2024-42974 is a stack-based buffer overflow vulnerability identified in the Tenda FH1206 router firmware version v02.03.01.35. The vulnerability arises from improper handling of the 'page' parameter within the fromwebExcptypemanFilter function. Specifically, the function fails to properly validate or limit the size of input data, allowing an attacker to overflow the stack by sending a specially crafted POST request. This overflow can overwrite the stack frame, leading to a crash of the affected process and resulting in a Denial of Service (DoS) condition. The vulnerability does not require any privileges or user interaction to exploit, making it accessible remotely by unauthenticated attackers over the network. The CVSS 3.1 base score of 6.5 reflects the medium severity, primarily due to the impact on availability without affecting confidentiality or integrity. No known public exploits or patches are currently available, indicating that the vulnerability is newly disclosed. The underlying weakness corresponds to CWE-121 (Stack-based Buffer Overflow), a common and well-understood software flaw. This vulnerability could be leveraged by attackers to disrupt network connectivity or degrade service availability for users relying on the affected Tenda router model.
Potential Impact
The primary impact of CVE-2024-42974 is the potential for Denial of Service (DoS) attacks against networks using the Tenda FH1206 router with the vulnerable firmware. Successful exploitation can cause the router's web management interface or related services to crash, leading to temporary loss of network management capabilities or even broader network outages if the device becomes unresponsive. This can disrupt business operations, especially for small to medium enterprises or home users relying on this device for internet connectivity. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is unlikely. However, the ease of remote exploitation without authentication increases the risk of widespread disruption. Organizations with critical reliance on these routers for network access or management could face operational downtime, impacting productivity and potentially leading to financial losses or reputational damage. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability remains a concern until patched.
Mitigation Recommendations
1. Monitor network traffic for unusual or malformed POST requests targeting the router's web interface, especially those containing suspicious 'page' parameter values. 2. Restrict access to the router's management interface by limiting exposure to untrusted networks; use firewall rules to allow management only from trusted IP addresses or internal networks. 3. Disable remote management features if not required to reduce the attack surface. 4. Regularly check for firmware updates from Tenda and apply them promptly once a patch addressing this vulnerability is released. 5. Implement network segmentation to isolate critical devices and reduce the impact of a compromised router. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) capable of identifying and blocking exploitation attempts targeting this vulnerability. 7. Maintain backups of router configurations to facilitate rapid recovery in case of a DoS event. 8. Engage with Tenda support channels to obtain information on patch timelines and interim mitigation advice.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cd4b7ef31ef0b5695f4
Added to database: 2/25/2026, 9:42:44 PM
Last enriched: 2/26/2026, 7:40:25 AM
Last updated: 2/26/2026, 12:44:08 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14343: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dokuzsoft Technology Ltd. E-Commerce Product
HighCVE-2026-1198: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Simple SA Simple.ERP
HighCVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.