ID

VAR-202404-1756


CVE

CVE-2024-32307


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  fh1205  Stack-based buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-020812

DESCRIPTION

Tenda FH1205 V2.0.0.7(775) firmware has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function. Shenzhen Tenda Technology Co.,Ltd. of fh1205 A stack-based buffer overflow vulnerability exists in the firmware.Information may be obtained and information may be tampered with. The Tenda FH1205 is a dual-band wireless router for home users. It supports the IEEE 802.11ac standard, offers wireless speeds up to 1200 Mbps, and operates in both the 2.4 GHz and 5 GHz frequency bands. This vulnerability stems from the PPW parameter in the fromWizardHandle method failing to properly validate the length of the input data. Detailed vulnerability details are currently unavailable

Trust: 2.16

sources: NVD: CVE-2024-32307 // JVNDB: JVNDB-2024-020812 // CNVD: CNVD-2025-18350

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-18350

AFFECTED PRODUCTS

vendor:tendamodel:fh1205scope:eqversion:2.0.0.7\(775\)

Trust: 1.0

vendor:tendamodel:fh1205scope:eqversion:fh1205 firmware 2.0.0.7(775)

Trust: 0.8

vendor:tendamodel:fh1205scope:eqversion: -

Trust: 0.8

vendor:tendamodel:fh1205scope: - version: -

Trust: 0.8

vendor:tendamodel:fh1205scope:eqversion:2.0.0.7(775)

Trust: 0.6

sources: CNVD: CNVD-2025-18350 // JVNDB: JVNDB-2024-020812 // NVD: CVE-2024-32307

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-32307
value: HIGH

Trust: 1.0

OTHER: JVNDB-2024-020812
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-18350
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-18350
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-32307
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 5.2
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-020812
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-18350 // JVNDB: JVNDB-2024-020812 // NVD: CVE-2024-32307

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-020812 // NVD: CVE-2024-32307

PATCH

title:Patch for Tenda FH1205 fromWizardHandle function buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/718466

Trust: 0.6

sources: CNVD: CNVD-2025-18350

EXTERNAL IDS

db:NVDid:CVE-2024-32307

Trust: 3.2

db:JVNDBid:JVNDB-2024-020812

Trust: 0.8

db:CNVDid:CNVD-2025-18350

Trust: 0.6

sources: CNVD: CNVD-2025-18350 // JVNDB: JVNDB-2024-020812 // NVD: CVE-2024-32307

REFERENCES

url:https://github.com/abcdefg-png/iot-vulnerable/blob/main/tenda/fh/fh1205/fromwizardhandle.md

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2024-32307

Trust: 0.8

sources: CNVD: CNVD-2025-18350 // JVNDB: JVNDB-2024-020812 // NVD: CVE-2024-32307

SOURCES

db:CNVDid:CNVD-2025-18350
db:JVNDBid:JVNDB-2024-020812
db:NVDid:CVE-2024-32307

LAST UPDATE DATE

2025-08-15T23:02:44.343000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-18350date:2025-08-13T00:00:00
db:JVNDBid:JVNDB-2024-020812date:2025-03-24T09:15:00
db:NVDid:CVE-2024-32307date:2025-03-17T15:06:45.053

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-18350date:2025-08-13T00:00:00
db:JVNDBid:JVNDB-2024-020812date:2025-03-24T00:00:00
db:NVDid:CVE-2024-32307date:2024-04-17T13:15:08.340