ID

VAR-202403-3247


CVE

CVE-2024-30635


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  F1202  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-020498

DESCRIPTION

Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability located in the funcpara1 parameter in the formSetCfm function. Shenzhen Tenda Technology Co.,Ltd. of F1202 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda F1202 is an enterprise-grade dual-band wireless router that supports both 2.4GHz and 5GHz bands, boasting a maximum transmission rate of 1200Mbps. It is equipped with four 5dBi antennas for enhanced signal coverage. This vulnerability stems from the failure of the funcpara1 parameter in the formSetCfm method to properly validate the length of input data. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2024-30635 // JVNDB: JVNDB-2024-020498 // CNVD: CNVD-2025-18173

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-18173

AFFECTED PRODUCTS

vendor:tendamodel:f1202scope:eqversion:1.2.0.20\(408\)

Trust: 1.0

vendor:tendamodel:f1202scope:eqversion:f1202 firmware 1.2.0.20(408)

Trust: 0.8

vendor:tendamodel:f1202scope:eqversion: -

Trust: 0.8

vendor:tendamodel:f1202scope: - version: -

Trust: 0.8

vendor:tendamodel:f1202scope:eqversion:1.2.0.20(408)

Trust: 0.6

sources: CNVD: CNVD-2025-18173 // JVNDB: JVNDB-2024-020498 // NVD: CVE-2024-30635

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-30635
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2024-020498
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-18173
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-18173
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-30635
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-020498
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-18173 // JVNDB: JVNDB-2024-020498 // NVD: CVE-2024-30635

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-020498 // NVD: CVE-2024-30635

PATCH

title:Patch for Tenda F1202 formSetCfm method buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/718056

Trust: 0.6

sources: CNVD: CNVD-2025-18173

EXTERNAL IDS

db:NVDid:CVE-2024-30635

Trust: 3.2

db:JVNDBid:JVNDB-2024-020498

Trust: 0.8

db:CNVDid:CNVD-2025-18173

Trust: 0.6

sources: CNVD: CNVD-2025-18173 // JVNDB: JVNDB-2024-020498 // NVD: CVE-2024-30635

REFERENCES

url:https://github.com/abcdefg-png/iot-vulnerable/blob/main/tenda/f/f1202/formsetcfm.md

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2024-30635

Trust: 0.8

sources: CNVD: CNVD-2025-18173 // JVNDB: JVNDB-2024-020498 // NVD: CVE-2024-30635

SOURCES

db:CNVDid:CNVD-2025-18173
db:JVNDBid:JVNDB-2024-020498
db:NVDid:CVE-2024-30635

LAST UPDATE DATE

2025-08-15T05:48:51.283000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-18173date:2025-08-12T00:00:00
db:JVNDBid:JVNDB-2024-020498date:2025-03-17T03:05:00
db:NVDid:CVE-2024-30635date:2025-03-13T21:26:21.357

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-18173date:2025-08-12T00:00:00
db:JVNDBid:JVNDB-2024-020498date:2025-03-17T00:00:00
db:NVDid:CVE-2024-30635date:2024-03-29T14:15:14.607