cve/2024/CVE-2024-2987.md

21 lines
1.5 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-2987](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2987)
![](https://img.shields.io/static/v1?label=Product&message=FH1202&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.2.0.14%5C%2F408%5C%2F%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=1.2.0.14(408)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121%20Stack-based%20Buffer%20Overflow&color=brightgreen)
### Description
A vulnerability classified as critical has been found in Tenda FH1202 1.2.0.14(408). Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine kritische Schwachstelle in Tenda FH1202 1.2.0.14(408) entdeckt. Hiervon betroffen ist die Funktion GetParentControlInfo der Datei /goform/GetParentControlInfo. Durch Manipulieren des Arguments mac mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/LaPhilosophie/IoT-vulnerable
- https://github.com/gh-ost00/IOT-Vulnerable_POC