Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46046: n/a

0
Medium
VulnerabilityCVE-2024-46046cvecve-2024-46046
Published: Fri Sep 13 2024 (09/13/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH451 v1.0.0.9 has a stack overflow vulnerability located in the RouteStatic function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:26:39 UTC

Technical Analysis

CVE-2024-46046 identifies a stack overflow vulnerability in the RouteStatic function of the Tenda FH451 router firmware version 1.0.0.9. The vulnerability is classified under CWE-121, indicating a classic stack-based buffer overflow caused by improper input validation or bounds checking within the static routing functionality. Exploitation requires no privileges or user interaction and can be triggered remotely, as indicated by the CVSS vector (AV:A/AC:L/PR:N/UI:N). The primary impact is on availability, as successful exploitation can cause the device to crash or reboot, resulting in denial of service. The CVSS score of 6.5 reflects a medium severity, balancing the ease of exploitation and the limited impact scope (no confidentiality or integrity loss). No patches or known exploits have been reported at the time of publication, suggesting the vulnerability is newly disclosed. The affected device, Tenda FH451, is a consumer and small business router, which may be deployed in various regions worldwide. The lack of authentication requirement and remote attack vector makes this vulnerability a concern for network stability, especially in environments relying on these routers for critical connectivity. The absence of patch links highlights the need for vigilance and proactive mitigation by users and administrators.

Potential Impact

The primary impact of CVE-2024-46046 is denial of service due to device crashes caused by the stack overflow in the RouteStatic function. Organizations relying on Tenda FH451 routers could experience network outages or degraded service availability, potentially disrupting business operations, communications, and access to internet resources. Although the vulnerability does not compromise confidentiality or integrity, the loss of availability can affect critical network infrastructure, especially in small to medium enterprises or home office environments where these routers are commonly used. The ease of remote exploitation without authentication increases the risk of automated attacks or scanning by malicious actors. However, the lack of known exploits in the wild currently limits immediate widespread impact. Still, the vulnerability could be leveraged in targeted attacks or as part of larger denial-of-service campaigns. The absence of patches means affected organizations must rely on network-level controls and monitoring until a firmware update is released.

Mitigation Recommendations

1. Immediately restrict remote access to the Tenda FH451 router management interfaces, especially from untrusted networks. 2. Implement network segmentation to isolate affected routers from critical infrastructure and sensitive data systems. 3. Monitor network traffic for unusual patterns or repeated attempts to access routing functions that could indicate exploitation attempts. 4. Disable or limit static routing features if not required to reduce the attack surface. 5. Regularly check Tenda’s official channels for firmware updates or security advisories addressing this vulnerability. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capabilities to identify potential exploitation attempts. 7. Consider replacing affected devices with alternative hardware if timely patches are not forthcoming and the risk is unacceptable. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential denial-of-service impacts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf7b7ef31ef0b56a8fc

Added to database: 2/25/2026, 9:43:19 PM

Last enriched: 2/26/2026, 8:26:39 AM

Last updated: 4/12/2026, 12:14:45 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses