Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42982: n/a

0
Medium
VulnerabilityCVE-2024-42982cvecve-2024-42982
Published: Thu Aug 15 2024 (08/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromVirtualSer function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:41:49 UTC

Technical Analysis

CVE-2024-42982 identifies a stack-based buffer overflow vulnerability in the Tenda FH1206 router firmware version v02.03.01.35. The vulnerability arises from improper handling of the 'page' parameter within the fromVirtualSer function. When a specially crafted POST request is sent to the affected device, the stack overflow can be triggered, leading to memory corruption. This corruption causes the router to crash or reboot, resulting in a Denial of Service (DoS) condition. The vulnerability does not affect confidentiality or integrity but impacts availability. Exploitation requires no authentication or user interaction and can be performed remotely over the network, increasing its risk profile. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). As of the publication date, no patches or official fixes have been released, and no active exploitation has been reported. The CVSS v3.1 base score is 5.3, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:L). This indicates a moderate severity level focused on service disruption rather than data compromise.

Potential Impact

The primary impact of CVE-2024-42982 is the disruption of network availability due to router crashes or reboots caused by the stack overflow. For organizations relying on Tenda FH1206 routers, this can lead to intermittent or prolonged network outages, affecting business continuity, productivity, and potentially critical communications. Since the vulnerability can be exploited remotely without authentication, attackers can launch DoS attacks from anywhere on the internet, increasing the threat surface. While the vulnerability does not expose sensitive data or allow unauthorized access, the loss of network connectivity can indirectly impact security monitoring, incident response, and operational capabilities. In environments where these routers serve as gateways or critical infrastructure components, the DoS could have cascading effects on dependent systems and services.

Mitigation Recommendations

To mitigate CVE-2024-42982, organizations should first verify if they are using the Tenda FH1206 router with firmware version v02.03.01.35. In the absence of an official patch, immediate mitigation steps include restricting access to the router's management interface by implementing network segmentation and firewall rules to block unsolicited POST requests targeting the vulnerable endpoint. Deploying intrusion detection or prevention systems (IDS/IPS) with custom signatures to detect anomalous POST requests containing suspicious 'page' parameter payloads can help identify and block exploitation attempts. Network administrators should monitor router logs for unusual crashes or reboots and consider temporary replacement or isolation of affected devices in critical environments. Regularly checking for firmware updates from Tenda and applying patches promptly once available is essential. Additionally, organizations should maintain robust network monitoring and incident response plans to quickly address potential DoS incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd4b7ef31ef0b569606

Added to database: 2/25/2026, 9:42:44 PM

Last enriched: 2/26/2026, 7:41:49 AM

Last updated: 4/12/2026, 2:37:15 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses