ID

VAR-202403-1114


CVE

CVE-2024-30591


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  FH1202  Stack-based buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-020433

DESCRIPTION

Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the time parameter of the saveParentControlInfo function. Shenzhen Tenda Technology Co.,Ltd. of FH1202 A stack-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the time parameter of the saveParentControlInfo method failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2024-30591 // JVNDB: JVNDB-2024-020433 // CNVD: CNVD-2024-36922

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-36922

AFFECTED PRODUCTS

vendor:tendamodel:fh1202scope:eqversion:1.2.0.14\(408\)

Trust: 1.0

vendor:tendamodel:fh1202scope:eqversion: -

Trust: 0.8

vendor:tendamodel:fh1202scope: - version: -

Trust: 0.8

vendor:tendamodel:fh1202scope:eqversion:fh1202 firmware 1.2.0.14(408)

Trust: 0.8

vendor:tendamodel:fh1202scope:eqversion:v1.2.0.14(408)

Trust: 0.6

sources: CNVD: CNVD-2024-36922 // JVNDB: JVNDB-2024-020433 // NVD: CVE-2024-30591

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-30591
value: HIGH

Trust: 1.0

OTHER: JVNDB-2024-020433
value: HIGH

Trust: 0.8

CNVD: CNVD-2024-36922
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-36922
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-30591
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-020433
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-36922 // JVNDB: JVNDB-2024-020433 // NVD: CVE-2024-30591

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-020433 // NVD: CVE-2024-30591

PATCH

title:Patch for Tenda FH1202 time parameter buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/585421

Trust: 0.6

sources: CNVD: CNVD-2024-36922

EXTERNAL IDS

db:NVDid:CVE-2024-30591

Trust: 3.2

db:JVNDBid:JVNDB-2024-020433

Trust: 0.8

db:CNVDid:CNVD-2024-36922

Trust: 0.6

sources: CNVD: CNVD-2024-36922 // JVNDB: JVNDB-2024-020433 // NVD: CVE-2024-30591

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2024-30591

Trust: 1.4

url:https://github.com/abcdefg-png/iot-vulnerable/blob/main/tenda/fh/fh1202/saveparentcontrolinfo_time.md

Trust: 1.0

sources: CNVD: CNVD-2024-36922 // JVNDB: JVNDB-2024-020433 // NVD: CVE-2024-30591

SOURCES

db:CNVDid:CNVD-2024-36922
db:JVNDBid:JVNDB-2024-020433
db:NVDid:CVE-2024-30591

LAST UPDATE DATE

2025-03-15T23:14:48.713000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-36922date:2024-08-30T00:00:00
db:JVNDBid:JVNDB-2024-020433date:2025-03-14T02:01:00
db:NVDid:CVE-2024-30591date:2025-03-13T17:41:59.363

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-36922date:2024-08-30T00:00:00
db:JVNDBid:JVNDB-2024-020433date:2025-03-14T00:00:00
db:NVDid:CVE-2024-30591date:2024-03-28T14:15:15.390