Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44859: n/a

0
High
VulnerabilityCVE-2024-44859cvecve-2024-44859
Published: Wed Sep 04 2024 (09/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1201 v1.2.0.14 has a stack buffer overflow vulnerability in `formWrlExtraGet`.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:50:22 UTC

Technical Analysis

CVE-2024-44859 is a stack-based buffer overflow vulnerability identified in the Tenda FH1201 router firmware version 1.2.0.14. The flaw exists in the formWrlExtraGet function, which likely processes input data without proper bounds checking, leading to a buffer overflow on the stack. This type of vulnerability (CWE-121) can allow an attacker to overwrite the return address or other control data on the stack, enabling arbitrary code execution. The CVSS 3.1 base score is 8.0, indicating high severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability does not require user interaction but does require the attacker to have some level of access to the local network, which is typical for router exploitation scenarios. No patches or known exploits are currently available, but the potential for remote code execution on a network device makes this a critical concern for network security. The lack of patch availability increases the urgency for mitigation through network controls and monitoring.

Potential Impact

Successful exploitation of CVE-2024-44859 can lead to complete compromise of the affected Tenda FH1201 router, allowing attackers to execute arbitrary code with the privileges of the router’s firmware. This can result in full control over network traffic, interception or manipulation of data, disruption of network services, and potential pivoting to other devices within the network. The confidentiality, integrity, and availability of network communications are all at risk. Organizations relying on this router model for critical network infrastructure could face significant operational disruptions, data breaches, and exposure to further attacks. The vulnerability’s requirement for local network access limits remote exploitation but still poses a serious threat in environments where attackers can gain internal access, such as through compromised devices or insider threats.

Mitigation Recommendations

Since no official patches are currently available, organizations should implement the following mitigations: 1) Restrict access to the router’s management interfaces to trusted administrators only, preferably via VLAN segmentation or firewall rules limiting local network access. 2) Monitor network traffic for unusual activity or attempts to exploit the formWrlExtraGet function, using intrusion detection/prevention systems (IDS/IPS) with custom signatures if possible. 3) Disable any unnecessary services or features on the Tenda FH1201 router to reduce the attack surface. 4) Regularly audit network devices for firmware updates and apply patches promptly once released by the vendor. 5) Consider replacing affected devices with models from vendors with stronger security track records if immediate patching is not feasible. 6) Educate network administrators about this vulnerability and enforce strict network access controls to prevent unauthorized lateral movement within the network.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ce6b7ef31ef0b56a001

Added to database: 2/25/2026, 9:43:02 PM

Last enriched: 2/28/2026, 6:50:22 AM

Last updated: 4/11/2026, 11:47:14 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses