First published: Wed Mar 27 2024(Updated: )
A vulnerability, which was classified as critical, was found in Tenda FH1202 1.2.0.14(408). Affected is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation of the argument ssid leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258150 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tenda FH1202 firmware | =1.2.0.14\(408\) | |
Tenda FH1202 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2981 is classified as a critical vulnerability.
To fix CVE-2024-2981, update to the latest firmware version for the Tenda FH1202 device.
CVE-2024-2981 allows for a stack-based buffer overflow, which could lead to remote code execution.
The affected version for CVE-2024-2981 is Tenda FH1202 firmware version 1.2.0.14(408).
Yes, CVE-2024-2981 is exploitable due to the stack-based buffer overflow in the Wi-Fi configuration function.