CVE-2024-30587 Overview
CVE-2024-30587 is a stack overflow vulnerability affecting the Tenda FH1202 wireless router firmware version 1.2.0.14(408). The vulnerability exists in the urls parameter of the saveParentControlInfo function, which fails to properly validate input length before copying data to a fixed-size stack buffer. This memory corruption flaw can be exploited remotely over the network without authentication, potentially allowing attackers to execute arbitrary code or cause a denial of service condition on affected devices.
Critical Impact
This vulnerability allows unauthenticated remote attackers to compromise Tenda FH1202 routers through network-accessible requests, potentially gaining complete control over the device or disrupting network operations.
Affected Products
- Tenda FH1202 Firmware version 1.2.0.14(408)
- Tenda FH1202 Hardware (all revisions running vulnerable firmware)
Discovery Timeline
- 2024-03-28 - CVE-2024-30587 published to NVD
- 2025-03-13 - Last updated in NVD database
Technical Details for CVE-2024-30587
Vulnerability Analysis
This vulnerability is classified as a stack-based buffer overflow (CWE-125: Out-of-Bounds Read) in the Tenda FH1202 router firmware. The flaw resides in the saveParentControlInfo function, which handles parental control configuration settings submitted through the router's web management interface.
When processing the urls parameter, the function copies user-supplied input to a stack-allocated buffer without adequate bounds checking. An attacker can supply an overly long string that exceeds the buffer's capacity, overwriting adjacent stack memory including saved return addresses and other critical control data.
The vulnerability is accessible over the network through the router's HTTP management interface. Since no authentication is required to trigger the vulnerable code path, any attacker with network access to the router can exploit this flaw.
Root Cause
The root cause is improper input validation in the saveParentControlInfo function. The firmware developers failed to implement adequate length checks before copying the urls parameter value into a fixed-size stack buffer. This allows an attacker to control the amount of data written to the stack, enabling classic stack-based buffer overflow exploitation techniques.
Attack Vector
The attack vector is network-based, targeting the Tenda FH1202 router's web management interface. An attacker can craft a malicious HTTP request containing an oversized urls parameter value directed at the saveParentControlInfo endpoint. The vulnerable function processes this request without proper bounds validation, leading to stack memory corruption.
Successful exploitation could allow an attacker to:
- Overwrite the function's return address to redirect execution
- Execute arbitrary code with router firmware privileges
- Cause a denial of service by crashing the router
- Potentially establish persistent access to the network device
Technical details and proof-of-concept information are documented in the GitHub IoT Vulnerability Resource.
Detection Methods for CVE-2024-30587
Indicators of Compromise
- Unusual HTTP requests to the router's management interface containing extremely long urls parameter values
- Unexpected router reboots or service interruptions without administrator action
- Anomalous network traffic patterns originating from or directed at the router's management port
- Router firmware configuration changes not initiated by administrators
Detection Strategies
- Monitor HTTP traffic to the router management interface for requests with abnormally large parameter values targeting the saveParentControlInfo function
- Implement network intrusion detection rules to identify potential buffer overflow exploitation attempts against Tenda devices
- Deploy application-layer firewall rules to block requests exceeding expected parameter lengths to router management endpoints
- Review router access logs for suspicious activity patterns or repeated requests to configuration endpoints
Monitoring Recommendations
- Enable logging on the router management interface and forward logs to a centralized SIEM for analysis
- Implement network segmentation to isolate IoT and network infrastructure devices from untrusted network segments
- Monitor for unexpected outbound connections from the router that may indicate successful compromise
- Regularly audit router configuration for unauthorized changes that could indicate exploitation
How to Mitigate CVE-2024-30587
Immediate Actions Required
- Restrict access to the router's web management interface to trusted administrative networks only
- Disable remote management access from WAN interfaces if enabled
- Implement firewall rules to block untrusted access to the router's HTTP management port
- Consider replacing affected devices with supported alternatives if no patch is available from the vendor
Patch Information
As of the last NVD update on 2025-03-13, no official patch information has been published by Tenda for this vulnerability. Organizations using affected Tenda FH1202 devices should monitor the vendor's website for firmware updates and apply patches immediately when available.
For additional technical details regarding this vulnerability, refer to the GitHub IoT Vulnerability Resource.
Workarounds
- Disable the web management interface entirely and use console access for configuration when possible
- Place the router behind a properly configured firewall that filters management traffic
- Implement network access control lists (ACLs) to restrict which IP addresses can reach the management interface
- Use a VPN to access the router's management interface from remote locations rather than exposing it directly
# Example firewall configuration to restrict management access
# Block external access to router management port (adjust IP/port as needed)
iptables -A INPUT -p tcp --dport 80 -s ! 192.168.1.0/24 -j DROP
iptables -A INPUT -p tcp --dport 443 -s ! 192.168.1.0/24 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

