Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46048: n/a

0
High
VulnerabilityCVE-2024-46048cvecve-2024-46048
Published: Fri Sep 13 2024 (09/13/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH451 v1.0.0.9 has a command injection vulnerability in the formexeCommand function i

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:27:08 UTC

Technical Analysis

CVE-2024-46048 identifies a command injection vulnerability in the Tenda FH451 router firmware version 1.0.0.9, specifically within the formexeCommand function. Command injection (CWE-77) vulnerabilities allow attackers to inject and execute arbitrary system commands on the affected device. This vulnerability is remotely exploitable without authentication (PR:N) and does not require user interaction (UI:N), making it highly accessible to attackers. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker can fully control the device, intercept or manipulate network traffic, and disrupt services. The attack vector is adjacent network (AV:A), implying exploitation requires network access, such as from a local network or VPN. The absence of patches or known exploits in the wild suggests the vulnerability is newly disclosed, but the risk remains significant due to the ease of exploitation and critical impact. Tenda FH451 routers are commonly used in small to medium business and residential environments, making this vulnerability a concern for a broad user base. The lack of version details beyond 1.0.0.9 limits precise scope but indicates that users running this firmware version are vulnerable. The vulnerability's presence in a core command execution function suggests deep system compromise is possible, including persistent backdoors or lateral movement within networks.

Potential Impact

The impact of CVE-2024-46048 is severe for organizations relying on Tenda FH451 routers. Successful exploitation allows attackers to execute arbitrary commands remotely without authentication, leading to full device compromise. This can result in interception or manipulation of network traffic, disruption of network availability, and potential pivoting to internal networks for further attacks. Confidential data passing through the router could be exposed or altered, undermining data integrity and privacy. The vulnerability threatens both enterprise and residential environments, especially those using these routers as primary network gateways. The lack of patches increases the window of exposure, and attackers could weaponize this flaw to create botnets, conduct espionage, or launch denial-of-service attacks. Organizations with limited network segmentation or weak perimeter defenses are particularly vulnerable. The threat also extends to supply chain risks if compromised routers are used in managed service provider environments.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls. First, restrict network access to the router's management interfaces by disabling remote management and limiting access to trusted IP addresses only. Segment the network to isolate vulnerable devices from critical infrastructure and sensitive data. Monitor network traffic for unusual command execution patterns or unexpected outbound connections from the router. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection attempts targeting Tenda devices. Regularly audit firmware versions and plan for firmware upgrades once patches become available. If possible, replace vulnerable devices with models from vendors with active security support. Educate users about the risks and encourage prompt reporting of network anomalies. Maintain backups of router configurations and logs to facilitate incident response. Collaborate with Tenda support channels to obtain updates or workarounds. Finally, consider deploying network-level firewalls or access control lists (ACLs) to block exploitation attempts targeting the vulnerable function.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf7b7ef31ef0b56a902

Added to database: 2/25/2026, 9:43:19 PM

Last enriched: 2/26/2026, 8:27:08 AM

Last updated: 4/12/2026, 5:08:38 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses