Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42982: n/a

0
Medium
VulnerabilityCVE-2024-42982cvecve-2024-42982
Published: Thu Aug 15 2024 (08/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-42982 is a medium-severity stack overflow vulnerability found in the Tenda FH1206 router firmware version v02. 03. 01. 35. The flaw exists in the fromVirtualSer function, specifically via the 'page' parameter, which can be exploited through a crafted POST request. Successful exploitation results in a Denial of Service (DoS) condition, causing the device to crash or become unresponsive. This vulnerability does not require authentication or user interaction and can be triggered remotely over the network. There are currently no known exploits in the wild, and no patches have been published yet. The CVSS score is 5. 3, reflecting a moderate impact primarily on availability.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:41:49 UTC

Technical Analysis

CVE-2024-42982 identifies a stack-based buffer overflow vulnerability in the Tenda FH1206 router firmware version v02.03.01.35. The vulnerability arises from improper handling of the 'page' parameter within the fromVirtualSer function. When a specially crafted POST request is sent to the affected device, the stack overflow can be triggered, leading to memory corruption. This corruption causes the router to crash or reboot, resulting in a Denial of Service (DoS) condition. The vulnerability does not affect confidentiality or integrity but impacts availability. Exploitation requires no authentication or user interaction and can be performed remotely over the network, increasing its risk profile. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). As of the publication date, no patches or official fixes have been released, and no active exploitation has been reported. The CVSS v3.1 base score is 5.3, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:L). This indicates a moderate severity level focused on service disruption rather than data compromise.

Potential Impact

The primary impact of CVE-2024-42982 is the disruption of network availability due to router crashes or reboots caused by the stack overflow. For organizations relying on Tenda FH1206 routers, this can lead to intermittent or prolonged network outages, affecting business continuity, productivity, and potentially critical communications. Since the vulnerability can be exploited remotely without authentication, attackers can launch DoS attacks from anywhere on the internet, increasing the threat surface. While the vulnerability does not expose sensitive data or allow unauthorized access, the loss of network connectivity can indirectly impact security monitoring, incident response, and operational capabilities. In environments where these routers serve as gateways or critical infrastructure components, the DoS could have cascading effects on dependent systems and services.

Mitigation Recommendations

To mitigate CVE-2024-42982, organizations should first verify if they are using the Tenda FH1206 router with firmware version v02.03.01.35. In the absence of an official patch, immediate mitigation steps include restricting access to the router's management interface by implementing network segmentation and firewall rules to block unsolicited POST requests targeting the vulnerable endpoint. Deploying intrusion detection or prevention systems (IDS/IPS) with custom signatures to detect anomalous POST requests containing suspicious 'page' parameter payloads can help identify and block exploitation attempts. Network administrators should monitor router logs for unusual crashes or reboots and consider temporary replacement or isolation of affected devices in critical environments. Regularly checking for firmware updates from Tenda and applying patches promptly once available is essential. Additionally, organizations should maintain robust network monitoring and incident response plans to quickly address potential DoS incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd4b7ef31ef0b569606

Added to database: 2/25/2026, 9:42:44 PM

Last enriched: 2/26/2026, 7:41:49 AM

Last updated: 2/26/2026, 9:35:31 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats