ID

VAR-202403-1697


CVE

CVE-2024-30604


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  fh1203  Out-of-bounds read vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-020481

DESCRIPTION

Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the list1 parameter of the fromDhcpListClient function. Shenzhen Tenda Technology Co.,Ltd. of fh1203 An out-of-bounds read vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. The Tenda FH1203 is a dual-band wireless router released by China's Tenda Group, primarily used for home network coverage. This vulnerability stems from the failure of the list1 parameter in the fromDhcpListClient method to properly validate the length of the input data. An attacker could exploit this vulnerability to cause a denial of service

Trust: 2.16

sources: NVD: CVE-2024-30604 // JVNDB: JVNDB-2024-020481 // CNVD: CNVD-2025-17044

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-17044

AFFECTED PRODUCTS

vendor:tendamodel:fh1203scope:eqversion:2.0.1.6

Trust: 1.0

vendor:tendamodel:fh1203scope:eqversion: -

Trust: 0.8

vendor:tendamodel:fh1203scope: - version: -

Trust: 0.8

vendor:tendamodel:fh1203scope:eqversion:fh1203 firmware 2.0.1.6

Trust: 0.8

vendor:tendamodel:fh1203scope:eqversion:v2.0.1.6

Trust: 0.6

sources: CNVD: CNVD-2025-17044 // JVNDB: JVNDB-2024-020481 // NVD: CVE-2024-30604

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-30604
value: HIGH

Trust: 1.0

OTHER: JVNDB-2024-020481
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-17044
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-17044
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-30604
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-020481
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-17044 // JVNDB: JVNDB-2024-020481 // NVD: CVE-2024-30604

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

problemtype:Out-of-bounds read (CWE-125) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-020481 // NVD: CVE-2024-30604

PATCH

title:Patch for Tenda FH1203 fromDhcpListClient method list1 parameter buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/713171

Trust: 0.6

sources: CNVD: CNVD-2025-17044

EXTERNAL IDS

db:NVDid:CVE-2024-30604

Trust: 3.2

db:JVNDBid:JVNDB-2024-020481

Trust: 0.8

db:CNVDid:CNVD-2025-17044

Trust: 0.6

sources: CNVD: CNVD-2025-17044 // JVNDB: JVNDB-2024-020481 // NVD: CVE-2024-30604

REFERENCES

url:https://github.com/abcdefg-png/iot-vulnerable/blob/main/tenda/fh/fh1203/fromdhcplistclient_list1.md

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2024-30604

Trust: 0.8

sources: CNVD: CNVD-2025-17044 // JVNDB: JVNDB-2024-020481 // NVD: CVE-2024-30604

SOURCES

db:CNVDid:CNVD-2025-17044
db:JVNDBid:JVNDB-2024-020481
db:NVDid:CVE-2024-30604

LAST UPDATE DATE

2025-07-30T23:02:20.760000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-17044date:2025-07-29T00:00:00
db:JVNDBid:JVNDB-2024-020481date:2025-03-14T06:15:00
db:NVDid:CVE-2024-30604date:2025-03-13T19:48:39.790

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-17044date:2025-07-29T00:00:00
db:JVNDBid:JVNDB-2024-020481date:2025-03-14T00:00:00
db:NVDid:CVE-2024-30604date:2024-03-28T15:15:46.850